diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20190.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20190.json index 2d59a13fa49..200a134d39e 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20190.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20190.json @@ -2,7 +2,7 @@ "id": "CVE-2017-20190", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T00:15:07.580", - "lastModified": "2024-08-08T19:35:01.580", + "lastModified": "2024-08-12T13:38:08.423", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31623.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31623.json index 71287c0c853..c769c5e43a7 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31623.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31623.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31623", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-25T21:15:08.657", - "lastModified": "2024-08-03T08:15:23.087", + "lastModified": "2024-08-12T13:38:09.363", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38322.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38322.json new file mode 100644 index 00000000000..2e12b48a2ad --- /dev/null +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38322.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2022-38322", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:09.530", + "lastModified": "2024-08-12T13:38:09.530", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31315.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31315.json new file mode 100644 index 00000000000..347a4cefdd7 --- /dev/null +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31315.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2023-31315", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-08-12T13:38:10.353", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json index 1fa2b072d3a..fb5e176444d 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3295.json @@ -2,13 +2,13 @@ "id": "CVE-2023-3295", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-17T02:15:08.917", - "lastModified": "2023-11-07T04:18:25.043", + "lastModified": "2024-08-12T13:38:11.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) for WordPress is vulnerable to arbitrary file uploads due to missing file type validation of files in the file manager functionality in versions up to, and including, 1.5.66 . This makes it possible for authenticated attackers, with contributor-level permissions and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The issue was partially patched in version 1.5.66 and fully patched in 1.5.67" + "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) for WordPress is vulnerable to arbitrary file uploads due to missing file type validation of files in the file manager functionality in versions up to, and including, 1.5.66 . This makes it possible for authenticated attackers, with contributor-level permissions and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The issue was partially patched in version 1.5.66 and fully patched in 1.5.67. CVE-2023-31231 appears to be a duplicate of this issue." } ], "metrics": { @@ -55,6 +55,18 @@ } ] }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38018.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38018.json new file mode 100644 index 00000000000..08e67811546 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38018.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-38018", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-08-12T13:38:10.877", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Shares 1.10.0 PL2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 260574." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7164325", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json index a9740f9e748..d87a5fdc90a 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38522.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38522", "sourceIdentifier": "security@apache.org", "published": "2024-07-26T10:15:01.923", - "lastModified": "2024-08-01T13:44:16.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-12T13:38:32.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -61,10 +91,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.1.11", + "matchCriteriaId": "E4F8362B-1EAE-453D-B231-744F00ED33BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.5", + "matchCriteriaId": "5DEB7909-4350-4D44-BAA2-72BEF6E132C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50809.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50809.json new file mode 100644 index 00000000000..008dc43045d --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50809.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-50809", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:11.923", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.sonos.com/en-us/security-advisory-2024-0001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50810.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50810.json new file mode 100644 index 00000000000..5889101f945 --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50810.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-50810", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:12.023", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In certain Sonos products before Sonos S1 Release 11.12 and S2 release 15.9, a vulnerability exists in the U-Boot component of the firmware that allow persistent arbitrary code execution with Linux kernel privileges. A failure to correctly handle the return value of the setenv command can be used to override the kernel command-line parameters and ultimately bypass the Secure Boot implementation. This affects PLAY5 gen 2, PLAYBASE, PLAY:1, One, One SL, and Amp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.sonos.com/en-us/security-advisory-2024-0001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5665.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5665.json index 51654a42c87..2fa33242775 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5665.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5665.json @@ -2,13 +2,13 @@ "id": "CVE-2023-5665", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-08T04:15:07.527", - "lastModified": "2024-03-05T20:23:44.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-12T13:38:12.337", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Payment Forms for Paystack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + "value": "The Payment Forms for Paystack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-32130 is likely a duplicate of this issue." }, { "lang": "es", @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json new file mode 100644 index 00000000000..0d903b725c9 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0113", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-08-12T13:38:12.693", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Mellanox OS, ONYX, Skyway, and MetroX-3 XCC contain a vulnerability in the web support, where an attacker can cause a CGI path traversal by a specially crafted URI. A successful exploit of this vulnerability might lead to escalation of privileges and information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5563", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json new file mode 100644 index 00000000000..403898b8415 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0115", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-08-12T13:38:12.943", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA CV-CUDA for Ubuntu 20.04, Ubuntu 22.04, and Jetpack contains a vulnerability in Python APIs where a user may cause an uncontrolled resource consumption issue by a long running CV-CUDA Python process. A successful exploit of this vulnerability may lead to denial of service and data loss." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5560", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json index 1ec2292226f..817cb613bb6 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json @@ -2,13 +2,13 @@ "id": "CVE-2024-21302", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-08T02:15:37.827", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-12T13:38:14.373", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS) including a subset of Azure Virtual Machine SKUS; enabling an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn..\nMicrosoft is developing a security update to mitigate this vulnerability, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022 , and a subset of Azure Virtual Machines (VM) SKUs with a Windows based guestOS supporting VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 07th, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section of this CVE to protect their systems.\nRecommended Actions:\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of VBS related files could help indicacte attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn\n\n\nProtect your Azure tenant by investigating administrators and users flagged for risky sign-ins and rotating their credentials.\n\nInvestigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn\n\n\nEnabling Multi-Factor Authentication can also help alleviate concerns about compromised accounts or exposure.\n\nEnforce multifactor..." + "value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS) including a subset of Azure Virtual Machine SKUS; enabling an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn..\nMicrosoft is developing a security update to mitigate this vulnerability, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022 , and a subset of Azure Virtual Machines (VM) SKUs with a Windows based guestOS supporting VBS.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center.\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 07th, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section of this CVE to protect their systems.\nRecommended Actions:\nThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.\n\nConfigure \u201cAudit Object Access\u201d settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.\n\nAudit File System - Windows 10 | Microsoft Learn\nApply a basic audit policy on a file or folder - Windows 10 | Microsoft Learn\n\n\nAuditing sensitive privileges used to identify access, modification, or replacement of VBS related files could help indicacte attempts to exploit this vulnerability.\n\nAudit Sensitive Privilege Use - Windows 10 | Microsoft Learn\n\n\nProtect your Azure tenant by investigating administrators and users flagged for risky sign-ins and rotating their credentials.\n\nInvestigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn\n\n\nEnabling Multi-Factor Authentication can also help alleviate concerns about compromised accounts or exposure.\n\nEnforce multifactor..." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21876.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21876.json new file mode 100644 index 00000000000..1ff7c83ef74 --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21876.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21876", + "sourceIdentifier": "csirt@divd.nl", + "published": "2024-08-12T13:38:14.743", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability via a URL parameter in Enphase IQ Gateway (formerly known as Envoy) allows an unautheticated attacker to access or create arbitratry files.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:D/RE:H/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "YES", + "recovery": "NOT_DEFINED", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2024-21876", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2024-00011", + "source": "csirt@divd.nl" + }, + { + "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-1", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21877.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21877.json new file mode 100644 index 00000000000..a0b9e5ecc3a --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21877.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21877", + "sourceIdentifier": "csirt@divd.nl", + "published": "2024-08-12T13:38:14.980", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and\u00a0< 8.2.4225." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:I/V:C/RE:H/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "YES", + "recovery": "IRRECOVERABLE", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2024-21877", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2024-00011", + "source": "csirt@divd.nl" + }, + { + "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-2", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json new file mode 100644 index 00000000000..e421f724f1f --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21878.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21878", + "sourceIdentifier": "csirt@divd.nl", + "published": "2024-08-12T13:38:15.107", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:I/V:C/RE:H/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "YES", + "recovery": "IRRECOVERABLE", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2024-21878", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2024-00011", + "source": "csirt@divd.nl" + }, + { + "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-3", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json new file mode 100644 index 00000000000..f32c228059b --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21879.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21879", + "sourceIdentifier": "csirt@divd.nl", + "published": "2024-08-12T13:38:15.237", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:I/V:C/RE:H/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "YES", + "recovery": "IRRECOVERABLE", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2024-21879", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2024-00011", + "source": "csirt@divd.nl" + }, + { + "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-4", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json new file mode 100644 index 00000000000..e03ecfd3cf0 --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21880.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21880", + "sourceIdentifier": "csirt@divd.nl", + "published": "2024-08-12T13:38:15.357", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:I/V:C/RE:H/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "YES", + "recovery": "IRRECOVERABLE", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2024-21880", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2024-00011", + "source": "csirt@divd.nl" + }, + { + "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-5", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21881.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21881.json new file mode 100644 index 00000000000..a8953894317 --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21881.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21881", + "sourceIdentifier": "csirt@divd.nl", + "published": "2024-08-12T13:38:15.500", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:I/V:C/RE:H/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "YES", + "recovery": "IRRECOVERABLE", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "csirt@divd.nl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "references": [ + { + "url": "https://csirt.divd.nl/CVE-2024-21881", + "source": "csirt@divd.nl" + }, + { + "url": "https://csirt.divd.nl/DIVD-2024-00011", + "source": "csirt@divd.nl" + }, + { + "url": "https://enphase.com/cybersecurity/advisories/ensa-2024-6", + "source": "csirt@divd.nl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22114.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22114.json new file mode 100644 index 00000000000..44af8b68abd --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22114.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22114", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:15.627", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25015", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22116.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22116.json new file mode 100644 index 00000000000..77a2c6c923c --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22116.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22116", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:15.863", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25016", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22121.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22121.json new file mode 100644 index 00000000000..732d6839a8b --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22121.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22121", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:16.070", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25011", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22122.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22122.json new file mode 100644 index 00000000000..f4d21d2c128 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22122.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22122", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:16.310", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25012", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22123.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22123.json new file mode 100644 index 00000000000..8ac9ad9dd88 --- /dev/null +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22123.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22123", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:16.520", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25013", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json index dee79940afc..93ffbb662e2 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25400.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25400", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T16:15:46.517", - "lastModified": "2024-08-02T00:15:29.923", + "lastModified": "2024-08-12T13:38:17.123", "vulnStatus": "Awaiting Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29082.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29082.json new file mode 100644 index 00000000000..f899e53498e --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29082.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-29082", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-12T13:38:18.050", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control vulnerability affecting Vonets\n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to bypass \nauthentication and factory reset the device via unprotected goform \nendpoints." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.8, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json new file mode 100644 index 00000000000..e12a24b0ee2 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-29831", + "sourceIdentifier": "security@apache.org", + "published": "2024-08-12T13:38:18.560", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server. If you are using the switch task plugin, please upgrade to version 3.2.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/x1ch0x5om3srtbnp7rtsvdszho3mdrq0", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30188.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30188.json new file mode 100644 index 00000000000..70950665e9e --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30188.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-30188", + "sourceIdentifier": "security@apache.org", + "published": "2024-08-12T13:38:19.727", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "File read and write vulnerability in Apache DolphinScheduler ,\u00a0 authenticated users can illegally access additional resource files.\nThis issue affects Apache DolphinScheduler: from 3.1.0 before 3.2.2.\n\nUsers are recommended to upgrade to version 3.2.2, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/tbrt42mnr42bq6scxwt6bjr3s2pwyd07", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json index 2792789e893..8acb3e622bd 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3162.json @@ -2,13 +2,13 @@ "id": "CVE-2024-3162", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-03T03:15:10.907", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-12T13:38:26.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonial Widget Attributes in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + "value": "The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonial Widget Attributes in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-32721 is likely a duplicate of this issue." }, { "lang": "es", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-87" + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3062484", diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32765.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32765.json new file mode 100644 index 00000000000..2f8d24802db --- /dev/null +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32765.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-32765", + "sourceIdentifier": "security@qnapsecurity.com.tw", + "published": "2024-08-12T13:38:20.823", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow local authenticated administrators to gain access to and execute certain functions via unspecified vectors.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQuTS hero h5.1.8.2823 build 20240712 and later" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@qnapsecurity.com.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-291" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.qnap.com/en/security-advisory/qsa-24-14", + "source": "security@qnapsecurity.com.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3279.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3279.json new file mode 100644 index 00000000000..32ae1b6d8d5 --- /dev/null +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3279.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-3279", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-08-12T13:38:26.990", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper access control vulnerability exists in the mintplex-labs/anything-llm application, specifically within the import endpoint. This vulnerability allows an anonymous attacker, without an account in the application, to import their own database file, leading to the deletion or spoofing of the existing `anythingllm.db` file. By exploiting this vulnerability, attackers can serve malicious data to users or collect information about them. The vulnerability stems from the application's failure to properly restrict access to the data-import functionality, allowing unauthorized database manipulation." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mintplex-labs/anything-llm/commit/08d33cfd8fc47c5052b6ea29597c964a9da641e2", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/303c5145-2c14-4945-914a-936be74dd04e", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json index 97daa3e1912..bfdbeff654f 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35161", "sourceIdentifier": "security@apache.org", "published": "2024-07-26T10:15:02.567", - "lastModified": "2024-08-01T13:52:33.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-12T13:39:50.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.1.11", + "matchCriteriaId": "E4F8362B-1EAE-453D-B231-744F00ED33BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.5", + "matchCriteriaId": "5DEB7909-4350-4D44-BAA2-72BEF6E132C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35296.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35296.json index 94ebbe39311..1d7fc54eb95 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35296.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35296", "sourceIdentifier": "security@apache.org", "published": "2024-07-26T10:15:02.713", - "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-12T13:55:37.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": "Un encabezado Invalid Accept-Encoding puede provocar que Apache Traffic Server no pueda realizar una b\u00fasqueda en cach\u00e9 y fuerce el reenv\u00edo de solicitudes. Este problema afecta a Apache Traffic Server: de la versi\u00f3n 8.0.0 a la 8.1.10 y de la versi\u00f3n 9.0.0 a la 9.2.4. Se recomienda a los usuarios que actualicen a la versi\u00f3n 8.1.11 o 9.2.5, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,10 +61,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.1.11", + "matchCriteriaId": "E4F8362B-1EAE-453D-B231-744F00ED33BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.5", + "matchCriteriaId": "5DEB7909-4350-4D44-BAA2-72BEF6E132C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35894.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35894.json index f5a0cc4e41d..a1072a54acf 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35894.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:10.397", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-08-12T13:38:21.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://git.kernel.org/stable/c/3ffb1ab698376f09cc33101c07c1be229389fe29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://git.kernel.org/stable/c/ee3c845787b621cfe82c2e52c513024a9d7a78f5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/fcf4692fa39e86a590c14a4af2de704e1d20a3b5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36034.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36034.json new file mode 100644 index 00000000000..7903a66ec29 --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36034.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36034", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-08-12T13:38:21.493", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions below\u00a08003 are vulnerable to authenticated SQL Injection in aggregate reports' search option." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-8003.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36035.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36035.json new file mode 100644 index 00000000000..42070ec7346 --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36035.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36035", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-08-12T13:38:21.737", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions below\u00a08003 are vulnerable to authenticated SQL Injection in user session recording." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-8003.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36460.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36460.json new file mode 100644 index 00000000000..2b474badf97 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36460.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36460", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:21.960", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25017", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36461.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36461.json new file mode 100644 index 00000000000..7607526910d --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36461.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36461", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:22.180", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25018", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36462.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36462.json new file mode 100644 index 00000000000..365297113ea --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36462.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36462", + "sourceIdentifier": "security@zabbix.com", + "published": "2024-08-12T13:38:22.400", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@zabbix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://support.zabbix.com/browse/ZBX-25019", + "source": "security@zabbix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36518.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36518.json new file mode 100644 index 00000000000..f86c8f39b6b --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36518.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36518", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-08-12T13:38:22.620", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions below\u00a08110 are vulnerable to authenticated SQL Injection in attack surface analyzer's dashboard." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2024-36518.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json index 0a6086b332a..7e7138efe0d 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3653.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3653", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-08T22:15:02.527", - "lastModified": "2024-07-09T18:19:14.047", + "lastModified": "2024-08-12T13:38:27.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,22 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4392", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5143", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5144", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5145", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5147", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-3653", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37023.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37023.json new file mode 100644 index 00000000000..22d3b34a03a --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37023.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-37023", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-12T13:38:22.837", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities affecting Vonets \n\n industrial wifi bridge relays and wifi bridge repeaters, software \nversions 3.3.23.6.9 and prior, enable an authenticated remote attacker \nto execute arbitrary OS commands via various endpoint parameters." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37283.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37283.json new file mode 100644 index 00000000000..7a03fc3d786 --- /dev/null +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37283.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-37283", + "sourceIdentifier": "bressers@elastic.co", + "published": "2024-08-12T13:38:23.093", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered whereby Elastic Agent will leak secrets from the agent policy elastic-agent.yml only when the log level is configured to debug. By default the log level is set to info, where no leak occurs." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elastic-agent-8-15-0-security-update-esa-2024-23/364635", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37826.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37826.json new file mode 100644 index 00000000000..fe743fdc7e4 --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37826.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37826", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:23.330", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL pointer dereference in vercot Serva v4.6.0 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Evian-Zhang/4453e7ac0da7cfa421c76c5ab514dba4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json index 933510c8e29..343db0e5928 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38166.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38166", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-06T22:15:54.163", - "lastModified": "2024-08-08T10:15:06.427", + "lastModified": "2024-08-12T13:38:23.440", "vulnStatus": "Undergoing Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json new file mode 100644 index 00000000000..ed695b74d10 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38200.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38200", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-12T13:38:23.550", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38200", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json index 140baf0552b..e85fb8e1278 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38206.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38206", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-06T22:15:54.430", - "lastModified": "2024-08-08T10:15:06.697", + "lastModified": "2024-08-12T13:38:23.820", "vulnStatus": "Undergoing Analysis", "cveTags": [ { diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json new file mode 100644 index 00000000000..e16210fd8b4 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38218.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-38218", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-12T13:38:23.933", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (HTML-based) Memory Corruption Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38218", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json new file mode 100644 index 00000000000..dc13733a57d --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38219.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-38219", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-08-12T13:38:24.123", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.7 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38219", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38989.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38989.json new file mode 100644 index 00000000000..8f9e82b15bf --- /dev/null +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38989.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-38989", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:24.333", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "izatop bunt v0.29.19 was discovered to contain a prototype pollution via the component /esm/qs.js. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/mestrtee/5e9830fb180a34d65f04fafb52d2b94b", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/izatop/bunt/commit/c55201a8cee03e5282f99874dead988c80d31db7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39338.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39338.json new file mode 100644 index 00000000000..3f851fd888c --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39338.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-39338", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:24.487", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/axios/axios/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://jeffhacks.com/advisories/2024/06/24/CVE-2024-39338.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json index deae05a8e94..8685911ab80 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39558.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39558", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:12.617", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-08-12T13:38:24.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS), when PIM is configured with Multicast-only Fast Reroute (MoFRR). Continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition.\n\nThis issue is observed on Junos and Junos Evolved platforms where PIM is configured along with MoFRR. MoFRR tries to select the active path, but due to an internal timing issue, rpd is unable to select the forwarding next-hop towards the source, resulting in an rpd crash.\n\nThis issue affects:\n\nJunos OS: \n\n\n * All versions before 20.4R3-S10, \n * from 21.2 before 21.2R3-S7, \n * from 21.4 before 21.4R3-S6, \n * from 22.1 before 22.1R3-S5, \n * from 22.2 before 22.2R3-S3, \n * from 22.3 before 22.3R3, \n * from 22.4 before 22.4R2;\u00a0\n\n\n\n\nJunos OS Evolved: \n\n\n * All versions before 20.4R3-S10 -EVO,\n * from 21.2-EVO before 21.2R3-S7 -EVO,\n * from 21.4-EVO before 21.4R3-S6 -EVO,\n * from 22.1-EVO before 22.1R3-S5 -EVO,\n * from 22.2-EVO before 22.2R3-S3-EVO,\n * from 22.3-EVO before 22.3R3-EVO,\n * from 22.4-EVO before 22.4R2-EVO." + "value": "An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS), when PIM is configured with Multicast-only Fast Reroute (MoFRR). Continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition.\n\nThis issue is observed on Junos and Junos Evolved platforms where PIM is configured along with MoFRR. MoFRR tries to select the active path, but due to an internal timing issue, rpd is unable to select the forwarding next-hop towards the source, resulting in an rpd crash.\n\nThis issue affects:\n\nJunos OS: \n\n\n * All versions before 20.4R3-S10, \n * from 21.2 before 21.2R3-S7, \n * from 21.4 before 21.4R3-S6, \n * from 22.1 before 22.1R3-S5, \n * from 22.2 before 22.2R3-S3, \n * from 22.3 before 22.3R3, \n * from 22.4 before 22.4R2;\u00a0\n\n\n\n\nJunos OS Evolved: \n\n\n * All versions before 20.4R3-S10 -EVO,\n * All versions of 21.2-EVO,\n * from 21.4-EVO before 21.4R3-S9-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO,\n * from 22.2-EVO before 22.2R3-S3-EVO,\n * from 22.3-EVO before 22.3R3-EVO,\n * from 22.4-EVO before 22.4R2-EVO." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39791.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39791.json new file mode 100644 index 00000000000..75f802e6555 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39791.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39791", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-12T13:38:24.857", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow vulnerabilities affecting Vonets\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enable an unauthenticated remote attacker to \nexecute arbitrary code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39815.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39815.json new file mode 100644 index 00000000000..4c90bd3f09e --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39815.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39815", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-12T13:38:25.150", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper check or handling of exceptional conditions vulnerability \naffecting Vonets\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated \nremote attacker to cause a denial of service. A specially-crafted \nHTTP request to pre-authentication resources can crash the service." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json new file mode 100644 index 00000000000..c86aa8a8e95 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40472.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40472", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.273", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sourcecodester Daily Calories Monitoring Tool v1.0 is vulnerable to SQL Injection via \"delete-calorie.php.\"" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Daily%20Calories%20Monitoring%20Tool%20v1.0/SQL%20Injection.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sourcecodester.com/php/17445/daily-calories-monitoring-tool-using-php-and-mysql-source-code.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json new file mode 100644 index 00000000000..8dbd817a2fd --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40473", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.373", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"manage_houses.php\" in SourceCodester Best House Rental Management System v1.0. It allows remote attackers to execute arbitrary code via \"House_no\" and \"Description\" parameter fields." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Stored%20XSS.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sourcecodester.com/php/17375/best-courier-management-system-project-php.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json new file mode 100644 index 00000000000..a0c8ee4f580 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40474.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40474", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.463", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"edit-cate.php\" in SourceCodester House Rental Management System v1.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Reflected%20XSS.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sourcecodester.com/php/17375/best-courier-management-system-project-php.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json new file mode 100644 index 00000000000..92cf430fd3a --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40475.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40475", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.553", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SourceCodester Best House Rental Management System v1.0 is vulnerable to Incorrect Access Control via /rental/payment_report.php, /rental/balance_report.php, /rental/invoices.php, /rental/tenants.php, and /rental/users.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Deep%20URL.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sourcecodester.com/php/17375/best-courier-management-system-project-php.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json new file mode 100644 index 00000000000..a0ed3db25f0 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40476.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40476", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.637", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in SourceCodester Best House Rental Management System v1.0. This could lead to an attacker tricking the administrator into adding/modifying/deleting valid tenant data via a crafted HTML page, as demonstrated by a Delete Tenant action at the /rental/ajax.php?action=delete_tenant." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Sourcecodester/Best%20House%20Rental%20Management%20System%20v1.0/CSRF.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.sourcecodester.com/php/17375/best-courier-management-system-project-php.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json new file mode 100644 index 00000000000..8d35a2ce661 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40477.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40477", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.727", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/oahms/admin/forgot-password.php\" in PHPGurukul Old Age Home Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"email\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/SQL%20Injection.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://phpgurukul.com/old-age-home-management-system-using-php-and-mysql/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40478.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40478.json new file mode 100644 index 00000000000..e317d49c186 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40478.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40478", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.820", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin/afeedback.php\" in Kashipara Online Exam System v1.0, which allows remote attackers to execute arbitrary code via \"rname\" and \"email\" parameter fields" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/Stored%20XSS.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/3/online-exam-php-project-source-code-download", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json new file mode 100644 index 00000000000..cf1305c580f --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40479.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40479", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:28.913", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/admin/quizquestion.php\" in Kashipara Online Exam System v1.0 allows remote attackers to execute arbitrary SQL commands via the \"eid\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/SQL%20Injection.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/3/online-exam-php-project-source-code-download", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40480.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40480.json new file mode 100644 index 00000000000..2bfd3c72ffc --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40480.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40480", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.003", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Broken Access Control vulnerability was found in /admin/update.php and /admin/dashboard.php in Kashipara Online Exam System v1.0, which allows remote unauthenticated attackers to view administrator dashboard and delete valid user accounts via the direct URL access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/Broken%20Access%20Control%20-%20Admin%20Dashboard%20and%20User%20Deletion.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/3/online-exam-php-project-source-code-download", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json new file mode 100644 index 00000000000..5f010e7f65d --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40481.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40481", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.093", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/admin/view-enquiry.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the Contact Us page \"message\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Stored%20XSS.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json new file mode 100644 index 00000000000..88509340ba6 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40482", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.180", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unrestricted file upload vulnerability was found in \"/Membership/edit_member.php\" of Kashipara Live Membership System v1.0, which allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json new file mode 100644 index 00000000000..49841142f35 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40484.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40484", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.273", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in \"/oahms/search.php\" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the \"searchdata\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/Reflected%20XSS.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json new file mode 100644 index 00000000000..26525832f2a --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40486", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.360", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in \"/index.php\" of Kashipara Live Membership System v1.0 allows remote attackers to execute arbitrary SQL commands and bypass Login via the email or password Login parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json new file mode 100644 index 00000000000..b61e519ae58 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40487", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.447", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/view_type.php\" of Kashipara Live Membership System v1.0, which allows remote attackers to execute arbitrary code via membershipType parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Stored%20XSS.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json new file mode 100644 index 00000000000..3210a43114d --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40488", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:29.537", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in the Kashipara Live Membership System v1.0. This could lead to an attacker tricking the administrator into deleting valid member data via a crafted HTML page, as demonstrated by a Delete Member action at the /delete_members.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://capec.mitre.org/data/definitions/62.html", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json index 816d32a106a..133c641a529 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41021", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T14:15:03.870", - "lastModified": "2024-07-29T16:21:52.517", + "lastModified": "2024-08-12T13:38:29.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/73a9260b7366d2906ec011e100319359fe2277d0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/9e13767ccefdc4f8aa92514b592b60f6b54882ff", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json new file mode 100644 index 00000000000..6b9f7b16e8d --- /dev/null +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41332.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41332", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:30.150", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in the delete_category function of Sourcecodester Computer Laboratory Management System v1.0 allows authenticated attackers with low-level privileges to arbitrarily delete categories." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstormsecurity.com/files/179890/Computer-Laboratory-Management-System-1.0-Privilege-Escalation.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.linkedin.com/in/sampath-kumar-kadajari-4b18891a7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41476.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41476.json new file mode 100644 index 00000000000..a01bddb1e51 --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41476.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41476", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:30.450", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AMTT Hotel Broadband Operation System (HiBOS) V3.0.3.151204 and before is vulnerable to SQL Injection via /manager/card/card_detail.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/lidy4x1/3314fbd82c3d72831c16f9c47a9bfb11", + "source": "cve@mitre.org" + }, + { + "url": "https://www.amttgroup.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json new file mode 100644 index 00000000000..1138d5ba462 --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41481.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41481", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:30.733", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the Mermaid component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.typora.io/What%27s-New-1.9/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41482.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41482.json new file mode 100644 index 00000000000..f6ab4e63631 --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41482.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41482", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:31.000", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the MathJax component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.typora.io/What%27s-New-1.9/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json new file mode 100644 index 00000000000..2bd719bf612 --- /dev/null +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41570.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41570", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:31.277", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unauthenticated Server-Side Request Forgery (SSRF) in demon callback handling in Havoc 2 0.7 allows attackers to send arbitrary network traffic originating from the team server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41577.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41577.json new file mode 100644 index 00000000000..8d618c99e1a --- /dev/null +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41577.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41577", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-12T13:38:31.513", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the Ueditor component of productinfoquick v1.0 allows attackers to execute arbitrary code via uploading a crafted PNG file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SENVIEL/learun-upload_file/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41888.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41888.json new file mode 100644 index 00000000000..43a35ba3726 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41888.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-41888", + "sourceIdentifier": "security@apache.org", + "published": "2024-08-12T13:38:31.617", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.3.5.\n\nThe password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked.\nUsers are recommended to upgrade to version 1.3.6, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/jbs1j2o9rqm5sc19jyk3jcfvkmfkmyf4", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41890.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41890.json new file mode 100644 index 00000000000..9b2df410d56 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41890.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-41890", + "sourceIdentifier": "security@apache.org", + "published": "2024-08-12T13:38:31.733", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.3.5.\n\nUser sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.\nUsers are recommended to upgrade to version 1.3.6, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/j7c080xj31x8rvz1pyk2h47rdd9pwbv9", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41936.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41936.json new file mode 100644 index 00000000000..e4105f1ed22 --- /dev/null +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41936.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41936", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-12T13:38:31.850", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to read arbitrary \nfiles and bypass authentication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42001.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42001.json new file mode 100644 index 00000000000..0de22e3fe28 --- /dev/null +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42001.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-42001", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-08-12T13:38:32.140", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper authentication vulnerability affecting Vonets\n\n\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior enables an unauthenticated remote attacker to \nbypass authentication via a specially crafted direct request when \nanother user has an active session." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42163.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42163.json new file mode 100644 index 00000000000..bb4598825ac --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42163.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42163", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2024-08-12T13:38:32.440", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently random values for generating password reset token in FIWARE Keyrock <= 8.4 allow\u00a0attackers to take over the account of any user by predicting the token for the password reset link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "references": [ + { + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42164.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42164.json new file mode 100644 index 00000000000..4d271f17b47 --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42164.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42164", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2024-08-12T13:38:32.667", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently random values for generating password reset token in FIWARE Keyrock <= 8.4 allow attackers to disable two factor authorization of any user by predicting the token for the disable_2fa link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42165.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42165.json new file mode 100644 index 00000000000..16d905f8959 --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42165.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42165", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2024-08-12T13:38:32.890", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently random values for generating activation token in FIWARE Keyrock <= 8.4 allow attackers to activate accounts of any user by predicting the token for the activation link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "references": [ + { + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42166.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42166.json new file mode 100644 index 00000000000..3665e1f5d88 --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42166.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42166", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2024-08-12T13:38:33.290", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The function \"generate_app_certificates\" in lib/app_certificates.js of FIWARE Keyrock <= 8.4 does not\u00a0neutralize special elements used in an OS Command properly. This allows an authenticated user with permissions to create applications to execute commands by creating an application with a malicious name." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42167.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42167.json new file mode 100644 index 00000000000..5e640573e16 --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42167", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2024-08-12T13:38:33.583", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The function \"generate_app_certificates\" in controllers/saml2/saml2.js of FIWARE Keyrock <= 8.4\u00a0does not neutralize special elements used in an OS Command properly. This allows an authenticated user with permissions to create applications to execute commands by creating an application with a malicious organisationname." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42226.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42226.json index 231eebb7eb7..c52b8453159 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42226.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42226.json @@ -2,129 +2,15 @@ "id": "CVE-2024-42226", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:07.817", - "lastModified": "2024-07-30T20:12:08.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-12T13:38:33.853", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB\n\nSome transfer events don't always point to a TRB, and consequently don't\nhave a endpoint ring. In these cases, function handle_tx_event() should\nnot proceed, because if 'ep->skip' is set, the pointer to the endpoint\nring is used.\n\nTo prevent a potential failure and make the code logical, return after\nchecking the completion code for a Transfer event without TRBs." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: xhci: evita posibles fallos en handle_tx_event() para eventos de transferencia sin TRB Algunos eventos de transferencia no siempre apuntan a un TRB y, en consecuencia, no tienen un anillo de endpoint. En estos casos, la funci\u00f3n handle_tx_event() no debe continuar, porque si se establece 'ep->skip', se utiliza el puntero al anillo del endpoint. Para evitar una posible falla y hacer que el c\u00f3digo sea l\u00f3gico, regrese despu\u00e9s de verificar el c\u00f3digo de finalizaci\u00f3n para un evento de Transferencia sin TRB." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "PHYSICAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 4.6, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 0.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.1.98", - "matchCriteriaId": "59AC0B46-8C0D-4C0B-9705-C8CFF0DCAD00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.1.99", - "versionEndExcluding": "6.6.39", - "matchCriteriaId": "A6DFF463-7F88-4F38-B6E6-F218C9E3698A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.6.40", - "versionEndExcluding": "6.9.9", - "matchCriteriaId": "03052A88-0586-4BB7-B47F-B626DBC304CA" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Not Applicable" - ] - }, - { - "url": "https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Not Applicable" - ] - }, - { - "url": "https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json new file mode 100644 index 00000000000..d7ef6b96102 --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42367.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-42367", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:34.240", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aio-libs/aiohttp/blob/e0ff5246e1d29b7710ab1a2bbc972b48169f1c05/aiohttp/web_fileresponse.py#L177", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aio-libs/aiohttp/blob/e0ff5246e1d29b7710ab1a2bbc972b48169f1c05/aiohttp/web_urldispatcher.py#L674", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aio-libs/aiohttp/commit/ce2e9758814527589b10759a20783fb03b98339f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aio-libs/aiohttp/pull/8653", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jwhx-xcg6-8xhj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42370.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42370.json new file mode 100644 index 00000000000..cb435f997a1 --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42370.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-42370", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:34.497", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. In versions 2.10.0 and prior, Litestar's `docs-preview.yml` workflow is vulnerable to Environment Variable injection which may lead to secret exfiltration and repository manipulation. This issue grants a malicious actor the permission to write issues, read metadata, and write pull requests. In addition, the `DOCS_PREVIEW_DEPLOY_TOKEN` is exposed to the attacker. Commit 84d351e96aaa2a1338006d6e7221eded161f517b contains a fix for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/litestar-org/litestar/actions/runs/10081936962/job/27875077668#step:1:17", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/litestar-org/litestar/blob/ffaf5616b19f6f0f4128209c8b49dbcb41568aa2/.github/workflows/docs-preview.yml", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/litestar-org/litestar/commit/84d351e96aaa2a1338006d6e7221eded161f517b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/litestar-org/litestar/security/advisories/GHSA-4hq2-rpgc-r8r7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json new file mode 100644 index 00000000000..72a915b5f14 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42467.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-42467", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:34.740", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Prior to version 4.2.1, the proxy endpoint of openHAB's CometVisu add-on can be accessed without authentication. This proxy-feature can be exploited as Server-Side Request Forgery (SSRF) to induce GET HTTP requests to internal-only servers, in case openHAB is exposed in a non-private network. Furthermore, this proxy-feature can also be exploited as a Cross-Site Scripting (XSS) vulnerability, as an attacker is able to re-route a request to their server and return a page with malicious JavaScript code. Since the browser receives this data directly from the openHAB CometVisu UI, this JavaScript code will be executed with the origin of the CometVisu UI. This allows an attacker to exploit call endpoints on an openHAB server even if the openHAB server is located in a private network. (e.g. by sending an openHAB admin a link that proxies malicious JavaScript.) This issue may lead up to Remote Code Execution (RCE) when chained with other vulnerabilities. Users should upgrade to version 4.2.1 of the CometVisu add-on of openHAB to receive a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/backend/rest/ProxyResource.java#L83", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-v7gr-mqpj-wwh3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42468.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42468.json new file mode 100644 index 00000000000..06eafc001fb --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42468.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-42468", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:34.970", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. CometVisuServlet in versions prior to 4.2.1 is susceptible to an unauthenticated path traversal vulnerability. Local files on the server can be requested via HTTP GET on the CometVisuServlet. This issue may lead to information disclosure. Users should upgrade to version 4.2.1 of the CometVisu add-on of openHAB to receive a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openhab/openhab-webui/blob/1c03c60f84388b9d7da0231df2d4ebb1e17d3fcf/bundles/org.openhab.ui.cometvisu/src/main/java/org/openhab/ui/cometvisu/internal/servlet/CometVisuServlet.java#L75", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-pcwp-26pw-j98w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42469.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42469.json new file mode 100644 index 00000000000..d7dc0c5f99d --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42469.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42469", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:35.187", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Prior to version 4.2.1, CometVisu's file system endpoints don't require authentication and additionally the endpoint to update an existing file is susceptible to path traversal. This makes it possible for an attacker to overwrite existing files on the openHAB instance. If the overwritten file is a shell script that is executed at a later time, this vulnerability can allow remote code execution by an attacker. Users should upgrade to version 4.2.1 to receive a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-f729-58x4-gqgf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42470.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42470.json new file mode 100644 index 00000000000..c96afbb45dc --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42470.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42470", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:35.440", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Several endpoints in versions prior to 4.2.1 of the CometVisu add-on of openHAB don't require authentication. This makes it possible for unauthenticated attackers to modify or to steal sensitive data. This issue may lead to sensitive information disclosure. Users should upgrade to version 4.2.1 of the CometVisu add-on of openHAB to receive a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openhab/openhab-webui/commit/630e8525835c698cf58856aa43782d92b18087f2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/openhab/openhab-webui/security/advisories/GHSA-3g4c-hjhr-73rj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json new file mode 100644 index 00000000000..fd2ac8fbb47 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42473.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42473", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-12T13:38:35.680", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenFGA is an authorization/permission engine. OpenFGA v1.5.7 and v1.5.8 are vulnerable to authorization bypass when calling Check API with a model that uses `but not` and `from` expressions and a userset. Users should downgrade to v1.5.6 as soon as possible. This downgrade is backward compatible. As of time of publication, a patch is not available but OpenFGA's maintainers are planning a patch for inclusion in a future release." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/openfga/openfga/security/advisories/GHSA-3f6g-m4hr-59h8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json new file mode 100644 index 00000000000..d3e47eae71c --- /dev/null +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43167.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-43167", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-08-12T13:38:35.927", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-43167", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303456", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/NLnetLabs/unbound/issues/1072", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/NLnetLabs/unbound/pull/1073/files", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json new file mode 100644 index 00000000000..c9183956485 --- /dev/null +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43168.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-43168", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-08-12T13:38:36.187", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-43168", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303462", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/NLnetLabs/unbound/issues/1039", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/NLnetLabs/unbound/pull/1040/files", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43199.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43199.json index fda0ed8483b..8c5e277c6f1 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43199.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43199.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43199", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-07T14:15:33.143", - "lastModified": "2024-08-07T21:35:10.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-12T12:59:48.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:ndoutils:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.4", + "matchCriteriaId": "09B7B2ED-542D-4706-BF7B-094895688902" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/NagiosEnterprises/ndoutils/commit/18ef12037f4a68772d6840cbaa08aa2da07d2891", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/NagiosEnterprises/ndoutils/compare/ndoutils-2.1.3...ndoutils-2.1.4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/NagiosEnterprises/ndoutils/pull/65", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json new file mode 100644 index 00000000000..4f7062b71e9 --- /dev/null +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2024-4350", + "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "published": "2024-08-12T13:38:36.460", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer\u00a0when user input is stored and later embedded into responses. A\u00a0rogue administrator could inject malicious code into fields due to insufficient input validation.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N \u00a0Thanks, m3dium for reporting." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 2.1, + "baseSeverity": "LOW" + } + } + ] + }, + "weaknesses": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes?pk_vid=e367a434ef4830491723060415d52041", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://documentation.concretecms.org/developers/introduction/version-history/8518-release-notes?pk_vid=e367a434ef4830491723055758d52041", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://github.com/concretecms/concretecms/commit/c08d9671cec4e7afdabb547339c4bc0bed8eab06", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://github.com/concretecms/concretecms/pull/12166", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json new file mode 100644 index 00000000000..519a8508ee7 --- /dev/null +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-4359", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:36.593", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to arbitrary file reads in all versions up to, and including, 5.7.2 via the SVG widget and a lack of sufficient file validation in the render_svg function. This makes it possible for authenticated attackers, with contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/svg-image/widgets/svg-image.php#L847", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a55cfeb3-7632-4a88-ac71-8e119b060721?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json new file mode 100644 index 00000000000..e7a17bd2bbb --- /dev/null +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-4360", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:36.840", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 5.7.2 due to insufficient input sanitization and output escaping on user supplied attributes like 'title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/custom-gallery/skins/skin-abetis.php#L164", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/910c0a32-b169-4728-888c-0dfea2066c9c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5445.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5445.json new file mode 100644 index 00000000000..ad2a3c5b019 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5445.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-5445", + "sourceIdentifier": "a5532a13-c4dd-4202-bef1-e0b8f2f8d12b", + "published": "2024-08-12T13:38:37.157", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ecosystem Agent version 4 < 4.5.1.2597 and Ecosystem Agent version 5 < 5.1.4.2473 did not properly validate SSL/TLS certificates, which could allow a malicious actor to perform a Man-in-the-Middle and intercept traffic between the agent and N-able servers from a privileged network position." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "a5532a13-c4dd-4202-bef1-e0b8f2f8d12b", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "a5532a13-c4dd-4202-bef1-e0b8f2f8d12b", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://me.n-able.com/s/article/How-to-check-Ecosystem-Agent-Version-in-N-sight", + "source": "a5532a13-c4dd-4202-bef1-e0b8f2f8d12b" + }, + { + "url": "https://me.n-able.com/s/article/How-to-check-Ecosystem-Agent-version-in-N-central", + "source": "a5532a13-c4dd-4202-bef1-e0b8f2f8d12b" + }, + { + "url": "https://me.n-able.com/s/security-advisory/aArVy0000000BhpKAE/cve20245445-ecosystem-agent-insufficient-transport-layer-security", + "source": "a5532a13-c4dd-4202-bef1-e0b8f2f8d12b" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5487.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5487.json new file mode 100644 index 00000000000..57ed3b62c9c --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5487.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5487", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-08-12T13:38:37.427", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions below\u00a08110 are vulnerable to authenticated SQL Injection in attack surface analyzer's export option." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2024-5487.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5527.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5527.json new file mode 100644 index 00000000000..058cd6717c9 --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5527", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-08-12T13:38:37.637", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine ADAudit Plus versions below\u00a08110 are vulnerable to authenticated SQL Injection in file auditing configuration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/products/active-directory-audit/cve-2024-5527.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5651.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5651.json new file mode 100644 index 00000000000..074c263fc2f --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5651.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-5651", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-08-12T13:38:37.863", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in fence agents that rely on SSH/Telnet. This vulnerability can allow a Remote Code Execution (RCE) primitive by supplying an arbitrary command to execute in the --ssh-path/--telnet-path arguments. A low-privilege user, for example, a user with developer access, can create a specially crafted FenceAgentsRemediation for a fence agent supporting\u00a0 --ssh-path/--telnet-path arguments to execute arbitrary commands on the operator's pod. This RCE leads to a privilege escalation, first as the service account running the operator, then to another service account with cluster-admin privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-5651", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290540", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5800.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5800.json new file mode 100644 index 00000000000..d8f9edf0937 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5800.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-5800", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2024-08-12T13:38:38.110", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Runtime versions before 6.0.2, allowing a network attacker to decrypt the SSL/TLS communication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.3, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] + } + ], + "references": [ + { + "url": "https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5801.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5801.json new file mode 100644 index 00000000000..2a85780b1de --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5801.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-5801", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2024-08-12T13:38:38.260", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by routing IP-based packets through the host, potentially by-passing firewall, router, or NAC filtering." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + }, + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json index c0433730cd6..76156d740f0 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5953.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5953", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-18T10:15:11.170", - "lastModified": "2024-08-06T16:15:49.570", + "lastModified": "2024-08-12T13:38:38.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,6 +60,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4997", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5192", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5953", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json index b3907ffebda..91b8bb04bf6 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5971", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-08T21:15:12.480", - "lastModified": "2024-07-25T21:15:11.560", + "lastModified": "2024-08-12T13:38:38.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,6 +60,22 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4884", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5143", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5144", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5145", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5147", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5971", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json new file mode 100644 index 00000000000..48de65dd596 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6133.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6133", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-12T13:38:38.703", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/fd613e1e-557c-4383-a3e9-4c14bc0be0c5/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json new file mode 100644 index 00000000000..e981571cfba --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6134.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6134", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-12T13:38:38.780", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/34d61f7e-90eb-4a64-a8a7-18f2d6518118/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json new file mode 100644 index 00000000000..758f2d543d5 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6136.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6136", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-12T13:38:38.850", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/7d85cfe4-4878-4530-ba78-7cfe33f3a8d5/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6158.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6158.json new file mode 100644 index 00000000000..210d284aab2 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6158.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6158", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-08-12T13:38:38.913", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Category Posts Widget WordPress plugin before 4.9.17, term-and-category-based-posts-widget WordPress plugin before 4.9.13 does not validate and escape some of its \"Category Posts\" widget settings before outputting them back in a page/post where the Widget is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/8adb219f-f0a6-4e87-8626-db26e300c220/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json index 04968d7d0cc..2e39c943a83 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6237.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6237", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-09T17:15:48.960", - "lastModified": "2024-08-06T16:15:49.690", + "lastModified": "2024-08-12T13:38:38.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -113,6 +113,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4997", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:5192", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6237", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6562.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6562.json new file mode 100644 index 00000000000..b194cf5ac1f --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6562.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6562", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:39.153", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The affiliate-toolkit \u2013 WordPress Affiliate Plugin plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.5.5. This is due display_errors being set to true . This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/affiliate-toolkit-starter/trunk/lib/apai-io/exeu/apai-io/samples/Search/SimpleSearch.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f810cc65-5a19-4ad7-a6b6-41a9b4f30f4c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6640.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6640.json new file mode 100644 index 00000000000..34f4c9665a2 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6640.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6640", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-08-12T13:38:39.380", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ICMPv6 Neighbor Discovery (ND), the ID is always 0. When pf is configured to allow ND and block incoming Echo Requests, a crafted Echo Request packet after a Neighbor Solicitation (NS) can trigger an Echo Reply. The packet has to come from the same host as the NS and have a zero as identifier to match the state created by the Neighbor Discovery and allow replies to be generated.\n\nICMPv6 packets with identifier value of zero bypass firewall rules written on the assumption that the incoming packets are going to create a state in the state table." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:05.pf.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6684.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6684.json new file mode 100644 index 00000000000..9c2889771cc --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6684.json @@ -0,0 +1,85 @@ +{ + "id": "CVE-2024-6684", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-08-12T13:38:39.450", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [ + { + "sourceIdentifier": "iletisim@usom.gov.tr", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in GST Electronics inohom Nova Panel N7 allows Authentication Bypass.This issue affects inohom Nova Panel N7: through 1.9.9.6.\u00a0NOTE: The vendor was contacted and it was learned that the product is not supported." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:X/RE:X/U:Red", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "RED", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1194", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6691.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6691.json new file mode 100644 index 00000000000..ef6298e7ba8 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6691.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6691", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:39.607", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy Digital Downloads \u2013 Sell Digital Files & Subscriptions (eCommerce Store + Payments Made Easy) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the currency value in all versions up to, and including, 3.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3131805/easy-digital-downloads/tags/3.3.3/src/Admin/Settings/Sanitize.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0459a6bd-334d-43b7-b289-271108564a53?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6692.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6692.json new file mode 100644 index 00000000000..4ce655ae68d --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6692.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6692", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:39.843", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Easy Digital Downloads \u2013 Sell Digital Files & Subscriptions (eCommerce Store + Payments Made Easy) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Agreement Text value in all versions up to, and including, 3.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3131805/easy-digital-downloads/tags/3.3.3/includes/checkout/template.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e54d5ab2-40ba-4ad8-9a77-44aba37f0283?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6758.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6758.json new file mode 100644 index 00000000000..c928f70052e --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6758.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6758", + "sourceIdentifier": "info@cert.vde.com", + "published": "2024-08-12T13:38:40.080", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management\u00a0in\u00a0Sprecher Automation SPRECON-E below version 8.71j allows a remote attacker with low privileges to save unauthorized protection assignments." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2407171_de.pdf", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6759.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6759.json new file mode 100644 index 00000000000..0a3dc137b00 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6759.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6759", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-08-12T13:38:40.380", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, \"/\". This allows readdir(3) and related functions to return filesystem entries with names containing additional path components.\n\nThe lack of validation described above gives rise to a confused deputy problem. For example, a program copying files from an NFS mount could be tricked into copying from outside the intended source directory, and/or to a location outside the intended destination directory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:07.nfsclient.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json new file mode 100644 index 00000000000..3a8ef51ded7 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6760", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-08-12T13:38:40.447", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs.\n\nThe bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:06.ktrace.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json new file mode 100644 index 00000000000..16119d47a99 --- /dev/null +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7006.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7006", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-08-12T13:38:40.577", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7006", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302996", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7272.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7272.json new file mode 100644 index 00000000000..68d4b3fac97 --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7272.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7272", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:40.850", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://ffmpeg.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc5", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273945", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273945", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7382.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7382.json new file mode 100644 index 00000000000..69b6fa276fd --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7382.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7382", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:41.283", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Linkify Text plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.9.1. This is due to the plugin utilizing bootstrap and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/linkify-text/tags/1.9.1/tests/bootstrap.php#L8", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/107548a1-3b5b-4838-815b-32b86e1b7ff5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7399.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7399.json new file mode 100644 index 00000000000..27cedc5aa52 --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7399.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7399", + "sourceIdentifier": "PSIRT@samsung.com", + "published": "2024-08-12T13:38:41.550", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "PSIRT@samsung.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@samsung.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://security.samsungtv.com/securityUpdates", + "source": "PSIRT@samsung.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7408.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7408.json new file mode 100644 index 00000000000..5f0f5170771 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7408.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7408", + "sourceIdentifier": "vdisclose@cert-in.org.in", + "published": "2024-08-12T13:38:41.777", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This vulnerability exists in Airveda Air Quality Monitor PM2.5 PM10 due to transmission of sensitive information in plain text during AP pairing mode. An attacker in close proximity could exploit this vulnerability by capturing Wi-Fi traffic of Airveda-AP.\n\nSuccessful exploitation of this vulnerability could allow the attacker to cause Evil Twin attack on the targeted system." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0233", + "source": "vdisclose@cert-in.org.in" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7410.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7410.json new file mode 100644 index 00000000000..3c5eefd2d18 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7410.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7410", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:41.910", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The My Custom CSS PHP & ADS plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.3. This is due the plugin not preventing direct access to the /my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php file and and the file displaying/generating the full path. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/my-custom-css/trunk/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d145d0af-e364-4cc3-af4f-03117eb34637?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json new file mode 100644 index 00000000000..76b37516551 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7412.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7412", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:42.130", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The No Update Nag plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.12. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/no-update-nag/trunk/tests/phpunit/bootstrap.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77faa23e-4475-43d9-b475-fe999cda7b62?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7413.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7413.json new file mode 100644 index 00000000000..c0676161148 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7413.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7413", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:42.357", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Obfuscate Email plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.8.1. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/obfuscate-email/trunk/phpunit/bootstrap.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/228079da-3c69-423c-b69b-f1a670258772?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7414.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7414.json new file mode 100644 index 00000000000..1db87567b1c --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7414.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7414", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:42.580", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The PDF Builder for WPForms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2.116. This is due to the plugin allowing direct access to the composer-setup.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/pdf-builder-for-wpforms/trunk/vendor/jurosh/pdf-merge/bin/composer-setup.php?rev=3009060", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3132289%40pdf-builder-for-wpforms&new=3132289%40pdf-builder-for-wpforms&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/31a82837-f8da-44bf-81f6-af0d9c9a6e4c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7416.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7416.json new file mode 100644 index 00000000000..8b2a2a10490 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7416.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7416", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:42.840", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Reveal Template plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.7. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/reveal-template/trunk/tests/phpunit/bootstrap.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34a36da0-a101-4c5a-bacb-9f131bded819?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7437.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7437.json index c8085cec7a2..0f86f8f6ef5 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7437.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7437.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7437", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-03T15:15:58.940", - "lastModified": "2024-08-05T12:41:45.957", + "lastModified": "2024-08-12T13:38:43.060", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as critical, was found in SimpleMachines SMF 2.1.4. Affected is an unknown function of the file /index.php?action=profile;u=2;area=showalerts;do=remove of the component Delete User Handler. The manipulation of the argument aid leads to improper control of resource identifiers. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273522 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as critical, was found in SimpleMachines SMF 2.1.4. Affected is an unknown function of the file /index.php?action=profile;u=2;area=showalerts;do=remove of the component Delete User Handler. The manipulation of the argument aid leads to improper control of resource identifiers. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7438.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7438.json index 94175bc2298..69029fdb97e 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7438.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7438.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7438", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-03T16:15:49.270", - "lastModified": "2024-08-05T12:41:45.957", + "lastModified": "2024-08-12T13:38:43.203", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been found in SimpleMachines SMF 2.1.4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php?action=profile;u=2;area=showalerts;do=read of the component User Alert Read Status Handler. The manipulation of the argument aid leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273523. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability has been found in SimpleMachines SMF 2.1.4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php?action=profile;u=2;area=showalerts;do=read of the component User Alert Read Status Handler. The manipulation of the argument aid leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json new file mode 100644 index 00000000000..c833919bd96 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7503.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7503", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:43.357", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.5. This is due to the use of loose comparison of the activation code in the 'woo_slg_confirm_email_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the userID. This requires the email module to be enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3b727ba-b39c-4a98-a6a6-ea33785079f6?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json new file mode 100644 index 00000000000..c70038e7628 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-7512", + "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "published": "2024-08-12T13:38:43.590", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in\u00a0Board instances. A\u00a0rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 1.8 with vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA: N.\u00a0Versions below 9 are not affected. \u00a0Thanks,\u00a0m3dium for reporting." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 1.8, + "baseSeverity": "LOW" + } + } + ] + }, + "weaknesses": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes?pk_vid=e367a434ef4830491723055753d52041", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://hackerone.com/reports/2486344", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7557.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7557.json new file mode 100644 index 00000000000..495358e9852 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7557.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7557", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-08-12T13:38:43.727", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in OpenShift AI that allows for authentication bypass and privilege escalation across models within the same namespace. When deploying AI models, the UI provides the option to protect models with authentication. However, credentials from one model can be used to access other models and APIs within the same namespace. The exposed ServiceAccount tokens, visible in the UI, can be utilized with oc --token={token} to exploit the elevated view privileges associated with the ServiceAccount, leading to unauthorized access to additional resources." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7557", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2303094", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7574.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7574.json new file mode 100644 index 00000000000..31d1e86cd62 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7574.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7574", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:43.940", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Christmasify! plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.5. This is due to missing nonce validation on the 'options' function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3132621/christmasify", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac247d3a-9e60-431e-ac98-2601e9907758?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7589.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7589.json new file mode 100644 index 00000000000..c2120304c3a --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7589.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-7589", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-08-12T13:38:44.203", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges.\n\nThis issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD.\n\nAs a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:08.openssh.asc", + "source": "secteam@freebsd.org" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2006-5051", + "source": "secteam@freebsd.org" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json new file mode 100644 index 00000000000..519a357825c --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7613.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7613", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:44.270", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/GstDhcpSetSer_bof%26injection", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273983", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273983", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.383691", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json new file mode 100644 index 00000000000..015ef55baa1 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7614.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7614", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:44.563", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1206 1.2.0.8(8155). It has been classified as critical. Affected is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/qossetting_bof", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273984", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273984", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.383692", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json new file mode 100644 index 00000000000..28f4918c128 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7615.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7615", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:44.840", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda FH1206 1.2.0.8. It has been declared as critical. Affected by this vulnerability is the function fromSafeClientFilter/fromSafeMacFilter/fromSafeUrlFilter. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/Safe_Client_or_Url_or_Mac_Filter_bof", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.273985", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273985", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.383693", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7616.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7616.json new file mode 100644 index 00000000000..67cf70d9acc --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7616.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7616", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:45.120", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Edimax IC-6220DC and IC-5150W up to 3.06. It has been rated as critical. Affected by this issue is the function cgiFormString of the file ipcam_cgi. The manipulation of the argument host leads to command injection. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.273986", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.273986", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.383845", + "source": "cna@vuldb.com" + }, + { + "url": "https://yjz233.notion.site/edimax-IC-5150W-has-command-injection-vulnerability-in-ipcam_cgi-cc72c7b7e2f24ba6a6609b6fcf78df34", + "source": "cna@vuldb.com" + }, + { + "url": "https://yjz233.notion.site/edimax-IC-6220DC-has-command-injection-vulnerability-in-ipcam_cgi-2029d67721f2473b8cfce5e286a70307?pvs=4", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7621.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7621.json new file mode 100644 index 00000000000..f7ad902245d --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7621.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7621", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:45.400", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Visual Website Collaboration, Feedback & Project Management \u2013 Atarim plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the process_wpfeedback_misc_options() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins settings which can also be leveraged to gain access to the plugin's settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/atarim-visual-collaboration/trunk/inc/wpf_function.php?rev=3116009#L235", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3133163/atarim-visual-collaboration/trunk/inc/wpf_function.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7f17e055-ad49-4115-89c5-dd76b6c531f7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7633.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7633.json new file mode 100644 index 00000000000..e5945900847 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7633.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-7633", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-08-12T13:38:45.690", + "lastModified": "2024-08-12T13:38:45.690", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7635.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7635.json new file mode 100644 index 00000000000..159de77f45d --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7635.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7635", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:45.753", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Simple Ticket Booking 1.0. It has been classified as critical. Affected is an unknown function of the file register_insert.php of the component Registration Handler. The manipulation of the argument name/email/dob/password/Gender/phone leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/space-security/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274056", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274056", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.386667", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7636.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7636.json new file mode 100644 index 00000000000..81cdae63116 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7636.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7636", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:46.037", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Simple Ticket Booking 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file authenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/space-security/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274057", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274057", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.386671", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7637.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7637.json new file mode 100644 index 00000000000..0d7b0f42819 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7637.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7637", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:46.327", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Online Polling 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file registeracc.php of the component Registration. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/space-security/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274058", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274058", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387088", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7638.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7638.json new file mode 100644 index 00000000000..c15f89d480d --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7638.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7638", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:46.623", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This affects an unknown part of the file delete_client.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/sqli_delete_client/Kortex_sqli(delete_client.php).md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274059", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274059", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387266", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7639.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7639.json new file mode 100644 index 00000000000..79784b9ef0c --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7639.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7639", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:46.903", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This vulnerability affects unknown code of the file delete_act.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/sqli_delete_act/sqli_delete_act.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274060", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274060", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387271", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7640.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7640.json new file mode 100644 index 00000000000..235f6eaeecb --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7640.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7640", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:47.190", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This issue affects some unknown processing of the file delete_register.php. The manipulation of the argument case_register_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/sqli_delete_register/sqli_delete_register.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274061", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274061", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387272", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7641.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7641.json new file mode 100644 index 00000000000..a96d0b9a2a8 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7641.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7641", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:47.460", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file deactivate_act.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/sqli_deactivate_act/sqli_deactivate_act.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274062", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274062", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387273", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7642.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7642.json new file mode 100644 index 00000000000..d032b1d30e7 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7642.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7642", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:47.737", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file activate_act.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/sqli_activate_act/sqli_activate_act.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274063", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274063", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387276", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7643.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7643.json new file mode 100644 index 00000000000..6d516cbfaed --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7643.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7643", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:48.030", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Leads Manager Tool 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /endpoint/delete-leads.php of the component Delete Leads Handler. The manipulation of the argument leads leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagersql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274064", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274064", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387344", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7644.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7644.json new file mode 100644 index 00000000000..612449c3dc9 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7644.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7644", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:48.333", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Leads Manager Tool 1.0. It has been classified as problematic. This affects an unknown part of the file /endpoint/add-leads.php of the component Add Leads Handler. The manipulation of the argument leads_name/phone_number leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagerxss.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274065", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274065", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387345", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json new file mode 100644 index 00000000000..97f2d55cb45 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7645.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7645", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:48.607", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file users.php of the component User Page. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ddChenA/cve/blob/main/csrf.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274066", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274066", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.387399", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7648.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7648.json new file mode 100644 index 00000000000..170d4a01c49 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7648.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7648", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:48.890", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Opal Membership plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.4 via the private notes functionality on payments which utilizes WordPress comments. This makes it possible for authenticated attackers, with subscriber-level access and above, to view private notes via recent comments that should be restricted to just administrators." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/opal-membership/trunk/inc/class-opalmembership-ajax.php#L128", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/opal-membership/trunk/inc/mixes-functions.php#L154", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3098565-d037-4a31-af3c-00e8b93b922e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7649.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7649.json new file mode 100644 index 00000000000..71957ceb652 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7649.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7649", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-12T13:38:49.107", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Opal Membership plugin for WordPress is vulnerable to Stored Cross-Site Scripting via checkout form fields in all versions up to, and including, 1.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/opal-membership/trunk/inc/class-opalmembership-checkout.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed2bb3e2-5002-4746-a4f8-b5d1752ccbbf?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json new file mode 100644 index 00000000000..7e821ddbb43 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7657.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2024-7657", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:49.340", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Gila CMS 1.10.9. This vulnerability affects unknown code of the file /cm/update_rows/page?id=2 of the component HTTP POST Request Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.274114", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274114", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.384630", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7658.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7658.json new file mode 100644 index 00000000000..2e47b6d9252 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7658.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7658", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:49.630", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/projectsend/projectsend/commit/eb5a04774927e5855b9d0e5870a2aae5a3dc5a08", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/projectsend/projectsend/releases/tag/r1720", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274115", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274115", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.385000", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json new file mode 100644 index 00000000000..c6a6c3bd87a --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7659.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-7659", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:49.920", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.6 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/projectsend/projectsend/commit/aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/projectsend/projectsend/releases/tag/r1720", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274116", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274116", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.385004", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json new file mode 100644 index 00000000000..b8d6c098aca --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7660.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7660", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:50.210", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester File Manager App 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Add File Handler. The manipulation of the argument File Title/Uploaded By leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://docs.google.com/document/d/19jCrr48SwP9dkOAaf8HAgg0fxK7PjE4ZWbPSFU4zqKE/edit?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274117", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274117", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388434", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json new file mode 100644 index 00000000000..3e52b7ee404 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7661.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7661", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:50.527", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been classified as problematic. This affects the function save_users of the file admin/user/index.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274119", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274119", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388765", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json new file mode 100644 index 00000000000..5d03791c26d --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7662.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7662", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:50.820", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been declared as problematic. This vulnerability affects the function save_package of the file admin/packages/manag_package.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20CSRF-2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274120", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274120", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388766", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json new file mode 100644 index 00000000000..083f42728e0 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7663.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7663", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:51.097", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274121", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274121", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388767", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json new file mode 100644 index 00000000000..bace47bf39a --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7664.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7664", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:51.397", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Car Driving School Management System 1.0. Affected is an unknown function of the file view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274122", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274122", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388768", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7665.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7665.json new file mode 100644 index 00000000000..2207e590e0d --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7665.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7665", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:51.707", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in SourceCodester Car Driving School Management System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_package.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-3.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274123", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274123", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388769", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7666.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7666.json new file mode 100644 index 00000000000..0f717fe926b --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7666.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7666", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:51.990", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Car Driving School Management System 1.0. Affected by this issue is some unknown functionality of the file view_package.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-4.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274124", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274124", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388770", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7667.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7667.json new file mode 100644 index 00000000000..d5731d45796 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7667.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7667", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:52.290", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Car Driving School Management System 1.0. This affects the function delete_users of the file User.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-5.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274125", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274125", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388771", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7668.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7668.json new file mode 100644 index 00000000000..21b2adaa59c --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7668.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7668", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:52.580", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Car Driving School Management System 1.0 and classified as critical. This vulnerability affects the function delete_package of the file Master.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-6.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274126", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274126", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388772", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7669.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7669.json new file mode 100644 index 00000000000..580c9a94c17 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7669.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7669", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:53.360", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0 and classified as critical. This issue affects the function delete_enrollment of the file Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-7.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274127", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274127", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388773", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7676.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7676.json new file mode 100644 index 00000000000..7e01ed40750 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7676.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7676", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:53.810", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Sourcecodester Car Driving School Management System 1.0. It has been classified as critical. Affected is the function save_package of the file /classes/Master.php?f=save_package. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20SQL%20Injection-8.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274128", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274128", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388831", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7677.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7677.json new file mode 100644 index 00000000000..92bbdc30e32 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7677.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7677", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:54.240", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been declared as problematic. Affected by this vulnerability is the function update_settings_info of the file /classes/SystemSettings.php?f=update_settings. The manipulation of the argument contact/address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20XSS-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274129", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274129", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388832", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7678.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7678.json new file mode 100644 index 00000000000..ad3e63ee2ab --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7678.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7678", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:54.640", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Car Driving School Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=save_package. The manipulation of the argument name/description/training_duration leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BFS-Lab/BFSDV/blob/main/Sourcecodester%20Online%20Catering%20Reservation%20System%20XSS-2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274130", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274130", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.388833", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7680.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7680.json new file mode 100644 index 00000000000..29536920b73 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7680.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7680", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:55.060", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/chenzg22/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274137", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274137", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389047", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7681.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7681.json new file mode 100644 index 00000000000..d94dc895b81 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7681.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7681", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:55.480", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects College Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument email/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/space-security/cve/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274138", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274138", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389158", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7682.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7682.json new file mode 100644 index 00000000000..267af498ffe --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7682.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7682", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:55.913", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Job Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file rw_i_nat.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/space-security/cve/issues/7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274139", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274139", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389161", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json new file mode 100644 index 00000000000..ebbe698600c --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7683.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7683", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:56.333", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file addcase_stage.php. The manipulation of the argument cname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/xss_addcase_stage/xss_addcase_stage.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274140", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274140", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389162", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json new file mode 100644 index 00000000000..b29e77f4dea --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7684.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7684", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:56.783", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected by this vulnerability is an unknown functionality of the file add_act.php. The manipulation of the argument aname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/xss_add_act/XSS_add_act.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274141", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274141", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389163", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json new file mode 100644 index 00000000000..b1f63718a3b --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7685.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7685", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:57.293", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file adds.php. The manipulation of the argument name/dob/email/mobile/address leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/xss_adds/XSS_adds.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274142", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274142", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389164", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json new file mode 100644 index 00000000000..910ff41ed73 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7686.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-7686", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-08-12T13:38:57.730", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This affects an unknown part of the file register_case.php. The manipulation of the argument title/description/opposite_lawyer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/samwbs/kortexcve/blob/main/xss_register_case/XSS_register_case.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.274143", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.274143", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.389165", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7693.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7693.json new file mode 100644 index 00000000000..99e7186b752 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7693.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7693", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-08-12T13:38:58.150", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Raiden MAILD Remote Management System from Team Johnlong Software has a Relative Path Traversal vulnerability, allowing unauthenticated remote attackers to read arbitrary file on the remote server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-7999-208bf-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7997-31bef-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7694.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7694.json new file mode 100644 index 00000000000..e20573fb28e --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7694.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7694", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-08-12T13:38:58.553", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ThreatSonar Anti-Ransomware from TeamT5 does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system command on the server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7998-d76dd-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7697.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7697.json new file mode 100644 index 00000000000..f3f79a4c07a --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7697.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-7697", + "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", + "published": "2024-08-12T13:38:58.913", + "lastModified": "2024-08-12T13:41:36.517", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Logical vulnerability in the mobile application (com.transsion.carlcare) may lead to user information leakage risks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.tecno.com/SRC/blogdetail/294?lang=en_US", + "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea" + }, + { + "url": "https://security.tecno.com/SRC/securityUpdates", + "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6469da0b469..89312bb1665 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-11T02:00:16.630064+00:00 +2024-08-12T14:00:18.173280+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-10T16:35:04.460000+00:00 +2024-08-12T13:55:37.307000+00:00 ``` ### Last Data Feed Release @@ -27,50 +27,73 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-08-11T00:00:08.640979+00:00 +2024-08-12T00:00:08.652221+00:00 ``` ### Total Number of included CVEs ```plain -259383 +259542 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `159` +- [CVE-2024-7658](CVE-2024/CVE-2024-76xx/CVE-2024-7658.json) (`2024-08-12T13:38:49.630`) +- [CVE-2024-7659](CVE-2024/CVE-2024-76xx/CVE-2024-7659.json) (`2024-08-12T13:38:49.920`) +- [CVE-2024-7660](CVE-2024/CVE-2024-76xx/CVE-2024-7660.json) (`2024-08-12T13:38:50.210`) +- [CVE-2024-7661](CVE-2024/CVE-2024-76xx/CVE-2024-7661.json) (`2024-08-12T13:38:50.527`) +- [CVE-2024-7662](CVE-2024/CVE-2024-76xx/CVE-2024-7662.json) (`2024-08-12T13:38:50.820`) +- [CVE-2024-7663](CVE-2024/CVE-2024-76xx/CVE-2024-7663.json) (`2024-08-12T13:38:51.097`) +- [CVE-2024-7664](CVE-2024/CVE-2024-76xx/CVE-2024-7664.json) (`2024-08-12T13:38:51.397`) +- [CVE-2024-7665](CVE-2024/CVE-2024-76xx/CVE-2024-7665.json) (`2024-08-12T13:38:51.707`) +- [CVE-2024-7666](CVE-2024/CVE-2024-76xx/CVE-2024-7666.json) (`2024-08-12T13:38:51.990`) +- [CVE-2024-7667](CVE-2024/CVE-2024-76xx/CVE-2024-7667.json) (`2024-08-12T13:38:52.290`) +- [CVE-2024-7668](CVE-2024/CVE-2024-76xx/CVE-2024-7668.json) (`2024-08-12T13:38:52.580`) +- [CVE-2024-7669](CVE-2024/CVE-2024-76xx/CVE-2024-7669.json) (`2024-08-12T13:38:53.360`) +- [CVE-2024-7676](CVE-2024/CVE-2024-76xx/CVE-2024-7676.json) (`2024-08-12T13:38:53.810`) +- [CVE-2024-7677](CVE-2024/CVE-2024-76xx/CVE-2024-7677.json) (`2024-08-12T13:38:54.240`) +- [CVE-2024-7678](CVE-2024/CVE-2024-76xx/CVE-2024-7678.json) (`2024-08-12T13:38:54.640`) +- [CVE-2024-7680](CVE-2024/CVE-2024-76xx/CVE-2024-7680.json) (`2024-08-12T13:38:55.060`) +- [CVE-2024-7681](CVE-2024/CVE-2024-76xx/CVE-2024-7681.json) (`2024-08-12T13:38:55.480`) +- [CVE-2024-7682](CVE-2024/CVE-2024-76xx/CVE-2024-7682.json) (`2024-08-12T13:38:55.913`) +- [CVE-2024-7683](CVE-2024/CVE-2024-76xx/CVE-2024-7683.json) (`2024-08-12T13:38:56.333`) +- [CVE-2024-7684](CVE-2024/CVE-2024-76xx/CVE-2024-7684.json) (`2024-08-12T13:38:56.783`) +- [CVE-2024-7685](CVE-2024/CVE-2024-76xx/CVE-2024-7685.json) (`2024-08-12T13:38:57.293`) +- [CVE-2024-7686](CVE-2024/CVE-2024-76xx/CVE-2024-7686.json) (`2024-08-12T13:38:57.730`) +- [CVE-2024-7693](CVE-2024/CVE-2024-76xx/CVE-2024-7693.json) (`2024-08-12T13:38:58.150`) +- [CVE-2024-7694](CVE-2024/CVE-2024-76xx/CVE-2024-7694.json) (`2024-08-12T13:38:58.553`) +- [CVE-2024-7697](CVE-2024/CVE-2024-76xx/CVE-2024-7697.json) (`2024-08-12T13:38:58.913`) ### CVEs modified in the last Commit -Recently modified CVEs: `321` +Recently modified CVEs: `23` -- [CVE-2024-7498](CVE-2024/CVE-2024-74xx/CVE-2024-7498.json) (`2024-08-06T16:30:24.547`) -- [CVE-2024-7499](CVE-2024/CVE-2024-74xx/CVE-2024-7499.json) (`2024-08-06T16:30:24.547`) -- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-08-06T23:15:59.653`) -- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T23:15:59.803`) -- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T23:15:59.877`) -- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T16:30:24.547`) -- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T16:30:24.547`) -- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T23:16:00.030`) -- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T23:16:00.177`) -- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T23:16:00.317`) -- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T16:30:24.547`) -- [CVE-2024-7532](CVE-2024/CVE-2024-75xx/CVE-2024-7532.json) (`2024-08-07T16:35:22.457`) -- [CVE-2024-7533](CVE-2024/CVE-2024-75xx/CVE-2024-7533.json) (`2024-08-07T20:35:27.510`) -- [CVE-2024-7534](CVE-2024/CVE-2024-75xx/CVE-2024-7534.json) (`2024-08-07T15:17:46.717`) -- [CVE-2024-7535](CVE-2024/CVE-2024-75xx/CVE-2024-7535.json) (`2024-08-08T20:35:12.890`) -- [CVE-2024-7536](CVE-2024/CVE-2024-75xx/CVE-2024-7536.json) (`2024-08-07T15:17:46.717`) -- [CVE-2024-7550](CVE-2024/CVE-2024-75xx/CVE-2024-7550.json) (`2024-08-07T20:35:28.567`) -- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T16:30:24.547`) -- [CVE-2024-7553](CVE-2024/CVE-2024-75xx/CVE-2024-7553.json) (`2024-08-07T15:17:46.717`) -- [CVE-2024-7578](CVE-2024/CVE-2024-75xx/CVE-2024-7578.json) (`2024-08-07T15:17:46.717`) -- [CVE-2024-7579](CVE-2024/CVE-2024-75xx/CVE-2024-7579.json) (`2024-08-07T15:17:46.717`) -- [CVE-2024-7580](CVE-2024/CVE-2024-75xx/CVE-2024-7580.json) (`2024-08-07T20:47:00.277`) -- [CVE-2024-7581](CVE-2024/CVE-2024-75xx/CVE-2024-7581.json) (`2024-08-07T19:59:00.853`) -- [CVE-2024-7584](CVE-2024/CVE-2024-75xx/CVE-2024-7584.json) (`2024-08-07T19:09:46.290`) -- [CVE-2024-7585](CVE-2024/CVE-2024-75xx/CVE-2024-7585.json) (`2024-08-07T19:09:46.290`) +- [CVE-2017-20190](CVE-2017/CVE-2017-201xx/CVE-2017-20190.json) (`2024-08-12T13:38:08.423`) +- [CVE-2022-31623](CVE-2022/CVE-2022-316xx/CVE-2022-31623.json) (`2024-08-12T13:38:09.363`) +- [CVE-2023-3295](CVE-2023/CVE-2023-32xx/CVE-2023-3295.json) (`2024-08-12T13:38:11.290`) +- [CVE-2023-38522](CVE-2023/CVE-2023-385xx/CVE-2023-38522.json) (`2024-08-12T13:38:32.837`) +- [CVE-2023-5665](CVE-2023/CVE-2023-56xx/CVE-2023-5665.json) (`2024-08-12T13:38:12.337`) +- [CVE-2024-21302](CVE-2024/CVE-2024-213xx/CVE-2024-21302.json) (`2024-08-12T13:38:14.373`) +- [CVE-2024-25400](CVE-2024/CVE-2024-254xx/CVE-2024-25400.json) (`2024-08-12T13:38:17.123`) +- [CVE-2024-3162](CVE-2024/CVE-2024-31xx/CVE-2024-3162.json) (`2024-08-12T13:38:26.607`) +- [CVE-2024-35161](CVE-2024/CVE-2024-351xx/CVE-2024-35161.json) (`2024-08-12T13:39:50.477`) +- [CVE-2024-35296](CVE-2024/CVE-2024-352xx/CVE-2024-35296.json) (`2024-08-12T13:55:37.307`) +- [CVE-2024-35894](CVE-2024/CVE-2024-358xx/CVE-2024-35894.json) (`2024-08-12T13:38:21.393`) +- [CVE-2024-3653](CVE-2024/CVE-2024-36xx/CVE-2024-3653.json) (`2024-08-12T13:38:27.570`) +- [CVE-2024-38166](CVE-2024/CVE-2024-381xx/CVE-2024-38166.json) (`2024-08-12T13:38:23.440`) +- [CVE-2024-38206](CVE-2024/CVE-2024-382xx/CVE-2024-38206.json) (`2024-08-12T13:38:23.820`) +- [CVE-2024-39558](CVE-2024/CVE-2024-395xx/CVE-2024-39558.json) (`2024-08-12T13:38:24.610`) +- [CVE-2024-41021](CVE-2024/CVE-2024-410xx/CVE-2024-41021.json) (`2024-08-12T13:38:29.623`) +- [CVE-2024-42226](CVE-2024/CVE-2024-422xx/CVE-2024-42226.json) (`2024-08-12T13:38:33.853`) +- [CVE-2024-43199](CVE-2024/CVE-2024-431xx/CVE-2024-43199.json) (`2024-08-12T12:59:48.253`) +- [CVE-2024-5953](CVE-2024/CVE-2024-59xx/CVE-2024-5953.json) (`2024-08-12T13:38:38.430`) +- [CVE-2024-5971](CVE-2024/CVE-2024-59xx/CVE-2024-5971.json) (`2024-08-12T13:38:38.567`) +- [CVE-2024-6237](CVE-2024/CVE-2024-62xx/CVE-2024-6237.json) (`2024-08-12T13:38:38.977`) +- [CVE-2024-7437](CVE-2024/CVE-2024-74xx/CVE-2024-7437.json) (`2024-08-12T13:38:43.060`) +- [CVE-2024-7438](CVE-2024/CVE-2024-74xx/CVE-2024-7438.json) (`2024-08-12T13:38:43.203`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f71a4ebd5de..3a66e2a8107 100644 --- a/_state.csv +++ b/_state.csv @@ -102522,7 +102522,7 @@ CVE-2017-20187,0,0,439daba23cb231bf9a3a05cf84608ee08920e004d7fa3d5d3a05b0063643f CVE-2017-20188,0,0,329272b92a1630954b6e2d9259a2b0f82ef555ab5ce6524e8e685ef56f14514b,2024-05-17T01:17:26.920000 CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4dbdb,2024-01-30T23:01:53.763000 CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000 -CVE-2017-20190,0,0,ab9ad5d427f26f97e2dff21ada3d7b6e713ef510acb60c8447bdbfe0a1feac80,2024-08-08T19:35:01.580000 +CVE-2017-20190,0,1,9dd2663b528e5bc8494bcc080744aaaef7094b4400daff7d3432981a0f57ec16,2024-08-12T13:38:08.423000 CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 @@ -199413,7 +199413,7 @@ CVE-2022-3162,0,0,94c5a9808c2af6e2d144dfc5fb54a6b06a92090516f69e51d01ee6db5a7468 CVE-2022-31620,0,0,f1c013eb788a6e6bfc9e63425793bc53ec53675319f63ab7927dff3e01ad6c01,2023-08-08T14:21:49.707000 CVE-2022-31621,0,0,09bfb96f488225e3ae09a756c803a149891c571a207a8c326f94f1d2a1b50a5b,2024-08-03T08:15:22.850000 CVE-2022-31622,0,0,a4c3ac694c0b0f5dc59f48718f1397841d0070cac2ec499b0494408342c107d5,2024-08-03T08:15:22.973000 -CVE-2022-31623,0,0,66a1336671c5ffaf6a5c611a52aff5c3bb825fe1afc466a4103e763f2adf2882,2024-08-03T08:15:23.087000 +CVE-2022-31623,0,1,c97c0883891a41bd5877fa21f0d16f792362d5d7eb05863b986d0e62854d6308,2024-08-12T13:38:09.363000 CVE-2022-31624,0,0,072eed7a5f3230c09cca78698220d2182cc895913c81b0c6e51df9d52db2c1eb,2023-08-08T14:22:24.967000 CVE-2022-31625,0,0,b2f4cc813c1ca180b90a012dcd95ca87f4fbfbb9e9eaac7bf904c97b8f8b2920,2023-11-07T03:47:39.820000 CVE-2022-31626,0,0,8d94e8e2103c7862bc20f22cd91ae7a0fc49a69374596f2d1963324fae2d8e4d,2023-11-07T03:47:39.910000 @@ -200698,7 +200698,7 @@ CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f2 CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000 CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000 CVE-2022-33166,0,0,e85541c384b746b96b9d33eb0263e975b828602e7416a357919e72b62444ef10,2023-06-21T01:22:50.790000 -CVE-2022-33167,0,1,eaa382e0d0b569b110b838afbd019a38dc92fe0e3970d74e0dbd643e48303a41,2024-07-31T12:57:02.300000 +CVE-2022-33167,0,0,eaa382e0d0b569b110b838afbd019a38dc92fe0e3970d74e0dbd643e48303a41,2024-07-31T12:57:02.300000 CVE-2022-33168,0,0,d8fdb94492ba6489154f8aca9c0eecd94de3711393c324c6e4d851bce05e2b6f,2023-06-21T01:21:46.097000 CVE-2022-33169,0,0,cfc3df51be78adce6bbadea63b270a04fdd7dbca24937beb040dac0cf32cf08d,2022-08-05T03:33:42.300000 CVE-2022-3317,0,0,88f73658b7867db677c6a97ed0d6c5ff67cd67599f695f80a21307846e2cb628,2023-08-08T14:22:24.967000 @@ -204683,6 +204683,7 @@ CVE-2022-38312,0,0,55bd278068b90d433767586c0f16da3a31c8a2cc7b33dbdd33eaf5d469f72 CVE-2022-38313,0,0,f2a6e048e0b2cfd891dcf9512b6588a003755e990c0a0b2af41f109d46319846,2022-09-10T03:23:30.860000 CVE-2022-38314,0,0,80ef55bfd7a55c96f827a2e684fd5b3b0284af3a4d8837afbf56c988e62146c6,2022-09-10T03:23:59.603000 CVE-2022-3832,0,0,25c24b69fcada40d28930ad5c94aa8c65b429a7f510bbd0965e8c04a189354f5,2023-11-07T03:51:51.417000 +CVE-2022-38322,1,1,b570471af3ac3da045db7127371f2f749811c7638f1312d2f0b9ea2e13584889,2024-08-12T13:38:09.530000 CVE-2022-38323,0,0,d981b4f0209e65c67c81dca1cdfb38410a74b7f3a197f9381f4884626ea4252e,2022-09-16T19:28:18.320000 CVE-2022-38325,0,0,ca7fbc39b430c537b1984a8035624bf220b3e035cc379bedbbc318f37cdce64a,2022-09-19T17:59:04.363000 CVE-2022-38326,0,0,2a7401538787142643256f9933f08013ee067bf6fb303bbcfaadd7845cdfac8c,2022-09-19T17:58:15.140000 @@ -205848,7 +205849,7 @@ CVE-2022-4001,0,0,39e00833890a7e901d0618677cbe7c015974d8ce8b3fdf8bf76b065f6484f8 CVE-2022-40010,0,0,e4ca794be921efc2a54ccc228989c9f920859f75c1b81f110a445bfe4d43d096,2023-07-03T19:22:31.680000 CVE-2022-40011,0,0,e0a7836f1f6caf5aaa0d1e732024ed4ec13801bc1a9feee6d639fca30c8c0a6d,2022-12-31T02:46:55.660000 CVE-2022-40016,0,0,4293ce2e94fa998b63d2973615f26a794c4e99e338b5386d7fd92fabc930a9b4,2023-02-24T18:00:30.037000 -CVE-2022-4002,0,1,75c0f2013fec27b05b5b97b366f295720c9bf99041fd3477b78c9b67389d1f94,2024-08-01T12:42:36.933000 +CVE-2022-4002,0,0,75c0f2013fec27b05b5b97b366f295720c9bf99041fd3477b78c9b67389d1f94,2024-08-01T12:42:36.933000 CVE-2022-40021,0,0,55495082a7e8fc42c46524fdc4cee33425e125ba7b8e79f799714cd824fe1e66,2023-03-01T13:25:18.070000 CVE-2022-40022,0,0,359622a2487ae7d5c9d1eb92d527a2b82b1805cff5f50680a87e6c0cbf3db6c7,2023-06-14T07:15:08.870000 CVE-2022-40023,0,0,317fae2e5472d2e61e852b0d952fabbaf592f8f971a366ffa8994d62e922648d,2023-08-08T14:22:24.967000 @@ -205856,7 +205857,7 @@ CVE-2022-40026,0,0,52559a29a375df8685cfac6399fe291a8d354c1ff8e84d0a4321b0a4e9fdf CVE-2022-40027,0,0,eff062cfff51df7f2d813d05e3dca5f0765df4a5be02cb57c50281f02478e582,2022-09-22T16:14:04.963000 CVE-2022-40028,0,0,280b1f9db19790d0026a8471ba9b82c539c1fbe37ff9db98ad39fcc7de98c4ea,2022-09-22T16:13:20.320000 CVE-2022-40029,0,0,f53cea960ac0734496cceb5b801cdeb46b65691454ac6da85ea7731bc20047c4,2022-09-22T16:12:30.937000 -CVE-2022-4003,0,1,f7964d7defcd3d42b2db8b58b9ef6856b9348b3c7bb8eac93323f0475dabdb49,2024-08-01T12:42:36.933000 +CVE-2022-4003,0,0,f7964d7defcd3d42b2db8b58b9ef6856b9348b3c7bb8eac93323f0475dabdb49,2024-08-01T12:42:36.933000 CVE-2022-40030,0,0,aa0bde9d2db758f20e54811a13859d5076699b2a7600b82157dce996cc74adcb,2022-09-22T16:11:05.273000 CVE-2022-40032,0,0,854b9692f1f37c61f06e3e33a5e50fef722063a372572d033a137af029be6682,2023-04-06T17:15:09.507000 CVE-2022-40034,0,0,298fbec15b4b696efb3008c20dd71d86f5fe2e6ce3c5512bf5bea0d9eef6af57,2023-02-01T02:41:40.263000 @@ -217762,8 +217763,8 @@ CVE-2023-24058,0,0,16a1b8d2c8f6e9521afc5ad7d9e751bc2a2f51cc265db69a156ca23c3660b CVE-2023-24059,0,0,85c8b3c7e51d4493812abc1130db36e5e554ca89f20febe06dc7c3c22cd7b3bb,2023-02-07T14:19:00.787000 CVE-2023-2406,0,0,93360eeb7d23c99f5e3d8592b06b8d380a992d1764480465d68abc46a85ae39a,2023-11-07T04:12:36.890000 CVE-2023-24060,0,0,237020e686b9d1fc77a983ae9b232c7b16e133620015d99d897981c2e94f39f4,2023-02-07T19:13:09.287000 -CVE-2023-24062,0,1,537116a16b61f499490e0fea32e215ba0257fcbecbd37f91b49ee44ecfedf0dd,2024-08-08T18:55:19.180000 -CVE-2023-24063,0,1,30cccd6745d0ec804a472b740983a2cea7533d7695de81fa0c578ffaf2a0560e,2024-08-08T18:55:19.180000 +CVE-2023-24062,0,0,537116a16b61f499490e0fea32e215ba0257fcbecbd37f91b49ee44ecfedf0dd,2024-08-08T18:55:19.180000 +CVE-2023-24063,0,0,30cccd6745d0ec804a472b740983a2cea7533d7695de81fa0c578ffaf2a0560e,2024-08-08T18:55:19.180000 CVE-2023-24064,0,0,0fe996ce317b59b73f2d635a6fa4c5e8c26a775ff4f09fb4a39e6b0e43cd5dd5,2024-08-09T16:35:00.767000 CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000 CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000 @@ -219543,8 +219544,8 @@ CVE-2023-26283,0,0,e2064453ef2858146e69fe81df96344f4104450fa7f97beea6cf1e61b0996 CVE-2023-26284,0,0,073b510f28598cf859c51864d3d5cb28a2670fa73a47d6359231a92a2ad99632,2023-11-07T04:09:33.223000 CVE-2023-26285,0,0,69e6dc88fcd70dc78045a5db1289708f9ca9a570c9301acb9ca5f4642eea2a04,2023-05-11T22:53:08.387000 CVE-2023-26286,0,0,cab2929777eabe42a9ecf50972c3c56d1004ade86317ce69ed1a003338ca9299,2023-05-12T05:15:17.507000 -CVE-2023-26288,0,1,a7b8c27184f2e26e607c00aba540e6c90f49a1ccaab172702a8f86417ee1c514,2024-07-31T12:57:02.300000 -CVE-2023-26289,0,1,332bc3e1728fadbb6b7d31a33e639ece4a7b14ca5b346b8e7c9f2d688d20386d,2024-07-31T12:57:02.300000 +CVE-2023-26288,0,0,a7b8c27184f2e26e607c00aba540e6c90f49a1ccaab172702a8f86417ee1c514,2024-07-31T12:57:02.300000 +CVE-2023-26289,0,0,332bc3e1728fadbb6b7d31a33e639ece4a7b14ca5b346b8e7c9f2d688d20386d,2024-07-31T12:57:02.300000 CVE-2023-2629,0,0,21397e525ac41df26b8c18bc0045d1b7263f8621bfadf0b1224b0c2fbfedb9fb,2023-05-31T14:02:09.597000 CVE-2023-26290,0,0,b45b134fbb8059d4d4a1ebae8fcfa511a842f92cfbbd7470a968c4d99358ab04,2023-11-07T04:09:33.393000 CVE-2023-26291,0,0,06cc66dbb2bc40c140a9d706389f20fb4cb58bd9ff5dd353e4433818c6edbc38,2023-11-07T04:09:33.470000 @@ -221671,7 +221672,7 @@ CVE-2023-2886,0,0,477489445a6f471cd3651b117fbf09416c16a3d7a4e7e46e8dd7486e10c87d CVE-2023-28862,0,0,1af0d4a2a1f54e0c65748ae11dcf6c8d306e7ce5050f714cb8bd21304ffd2ff4,2023-07-14T13:15:09.167000 CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000 CVE-2023-28864,0,0,324e76b8a1dbbfe673722acba31555a0a11e3e449df86950e1771c91d26b1827,2023-07-27T03:47:50.647000 -CVE-2023-28865,0,1,dca6bcd6c4ac51b3bf02b3251701912f933a1c5fc654cc75e543a32ff3414aee,2024-08-08T20:35:00.890000 +CVE-2023-28865,0,0,dca6bcd6c4ac51b3bf02b3251701912f933a1c5fc654cc75e543a32ff3414aee,2024-08-08T20:35:00.890000 CVE-2023-28866,0,0,943391c7b240adde0202bacb48afef5edfa2b7d2d32f1761a9ddbf651b944ce4,2023-11-07T04:10:55.740000 CVE-2023-28867,0,0,318a66eaa8452f89942f53703d11d40849d2cc65087bebb0348dcf4f3572c7cb,2023-04-03T14:01:07.433000 CVE-2023-28868,0,0,e275a03d8640a97b2d96fd845bc40f2c87b07888c0c512aa8d3aec81f7c1a577,2023-12-12T22:35:26.717000 @@ -223466,6 +223467,7 @@ CVE-2023-31300,0,0,c6a4108718dbef116ebe62862a40eb993a0f2f7732323f0332ebfa85216b3 CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc0555465f,2024-01-04T21:53:26.990000 CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 +CVE-2023-31315,1,1,06f3374583447ac6dd2337b4deb9645b951cab953e75f1269c45b0e2c7e7c0e7,2024-08-12T13:41:36.517000 CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000 CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000 CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e42,2023-11-07T04:17:58.197000 @@ -223687,7 +223689,7 @@ CVE-2023-3173,0,0,c35696f61ff8950bcc3f69adc71d508d0f1269bf8bfa62a3ad838c1fa5959c CVE-2023-31740,0,0,496ecf3af23602f69c60a58f4589e2378fe4331abe2e3c4aef85846204b94c2f,2023-05-30T19:17:44.447000 CVE-2023-31741,0,0,ea5ca48291c6b500e9a5d0deeb0fade6dc80f42dd4fcf70bb5502e5e32ab8e89,2023-05-31T00:26:35.690000 CVE-2023-31742,0,0,4708b4b3dd75f15459c170b6a2ba21255f265c6d49d8fd1a6b3396791233c91d,2023-05-30T15:37:06.417000 -CVE-2023-31746,0,1,676e22cba5baa7cef2f721ca9c2b8ecfaeab2b63cfff7345b9a85790281ea4b5,2023-06-26T13:50:53.057000 +CVE-2023-31746,0,0,676e22cba5baa7cef2f721ca9c2b8ecfaeab2b63cfff7345b9a85790281ea4b5,2023-06-26T13:50:53.057000 CVE-2023-31747,0,0,51cd64b252071d6b75a2b97f39556e8b509a4ee2224024527828d49878f5ce7f,2023-05-31T18:03:21.437000 CVE-2023-31748,0,0,266cbd124108618a3f277f7613408e7b9a52f218f891b1b9d823f2a713cba1fa,2023-05-31T00:34:02.457000 CVE-2023-3175,0,0,8a2065d13d64eee98ec17296fdd32694520a25bed37e16a71f47a563eb1cd995,2023-11-07T04:18:07.363000 @@ -224705,7 +224707,7 @@ CVE-2023-3291,0,0,00fc96abca2c8a545f91e8bae7ebecfa7718dc43d0e1342f2015e152babb98 CVE-2023-3292,0,0,b8ef5306ce74b9329b1620092abdf02378458b4d99143d5d695cd947fdd9bb06,2023-11-07T04:18:24.753000 CVE-2023-3293,0,0,72720dc679e6136c56dea1818ea89a7c6e888dfcb7dd739b8f7bb9a85a705eb5,2023-06-22T21:30:35.250000 CVE-2023-3294,0,0,1b4b00e0f705616d410fa9b39e1092447f9eed6300fb3dc7ef135392d7ad651f,2023-06-23T21:26:49.927000 -CVE-2023-3295,0,0,bd9d5917b1152099d61138a17f649efec74d5db4f356552f955c01517dd2264c,2023-11-07T04:18:25.043000 +CVE-2023-3295,0,1,e779ba829a6c7d52ccc35560a769470cd0c0a23af3caba3e359a5d5a3ab56dc1,2024-08-12T13:38:11.290000 CVE-2023-32955,0,0,61d0e49080cedd0522d34227a5c22e22b65390bc79180c9847f44956574b84ba,2023-11-07T04:14:43.563000 CVE-2023-32956,0,0,6d79fbebbb8abd430f92328682c7425ff22687ac72560487627c14368840946b,2023-11-07T04:14:43.633000 CVE-2023-32957,0,0,b9c2446981231de3a55c46ec344d8368a4af380806615df14b0a4cff6b315c3d,2023-11-21T01:05:39.910000 @@ -228208,7 +228210,7 @@ CVE-2023-37836,0,0,f0dbfc563be8b9bfbdf2fbcad46728530e0a233859698f998a5d6f9b50eab CVE-2023-37837,0,0,759a1745690068f59d90c4465aec0df4ef9d4436973b0f5199a2b661f1c46e6f,2023-07-27T15:00:48.060000 CVE-2023-37839,0,0,ccc135d7d2305082881e675c069336d7b6361882f4d0e7b233cb6252647c7aba,2023-07-27T14:48:45.950000 CVE-2023-3784,0,0,5135b5e6a30130c2e68d83139b8293508656f7ebb8a7ed747cbfa4649a9df9c7,2024-05-17T02:27:47.360000 -CVE-2023-37847,0,1,1d67d2403282fbd02db6502532679fbce375514d8946d834e59a07c9ef953522,2023-08-18T03:21:16.680000 +CVE-2023-37847,0,0,1d67d2403282fbd02db6502532679fbce375514d8946d834e59a07c9ef953522,2023-08-18T03:21:16.680000 CVE-2023-37849,0,0,952b8fbd377f0e2b41eb2b70793b70b83661493b3aa4195249fec65abf884fd7,2023-07-27T14:50:09.963000 CVE-2023-3785,0,0,1cf8275c47bc33716435cf5d0d1b08212e7dd11a6c2c6b0b6658d3b85cf726cc,2024-05-17T02:27:47.457000 CVE-2023-37850,0,0,286f1040431ced574b387f41a41491559bf26e9d7489f67627c6f4fa01e1d843,2023-11-07T04:17:07.920000 @@ -228353,10 +228355,11 @@ CVE-2023-37998,0,0,b235ebc4dfb9ccf88c1ccca0a67b26b1e77751f80e2e1faaef2f3a2c5008f CVE-2023-37999,0,0,0ffe5370e8d38da9bb953723ad926e1f3493ef3ca0779b6a9480408ff8b47933,2024-05-17T18:36:05.263000 CVE-2023-3800,0,0,9adb1d1466c7c08548f0b20099e401daef224cd81c97907d28a5225c2b6e13a0,2024-05-17T02:27:49.107000 CVE-2023-38000,0,0,9ba3b6ec3d4ae6f319e5b267a1938b9242dfbd7353650738c1d9f78858e009da,2023-10-16T17:04:06.637000 -CVE-2023-38001,0,1,e4569a6f272b2d72f239fb54f7412fab5c0d6f490e2ae6f809788712aa166f86,2024-07-31T12:57:02.300000 +CVE-2023-38001,0,0,e4569a6f272b2d72f239fb54f7412fab5c0d6f490e2ae6f809788712aa166f86,2024-07-31T12:57:02.300000 CVE-2023-38002,0,0,1540466a828ca09fbbbfd3a7d1fa6f341816e6e7a4b7eb520ebe82fd4c1ac11f,2024-04-30T17:52:35.057000 CVE-2023-38003,0,0,4ddd805b10542d9494e91de28e072619549d2912a77654914b8456fbaea47381,2024-01-19T16:15:09.013000 CVE-2023-3801,0,0,138ee77b03ceaffda7a612b3ad2047ee632ca7ad988ceac5a51bc864960549cf,2024-05-17T02:27:49.220000 +CVE-2023-38018,1,1,3358198459400a00d1bd6d153034ed0a45ae2ad246194eb75d6fccb44cf95f07,2024-08-12T13:41:36.517000 CVE-2023-38019,0,0,a7483660a3183e15c0cacd3224b950f982216efcae0797ec3946c751f10866dc,2024-02-09T19:13:52.923000 CVE-2023-3802,0,0,fdc4ccc90abad68517d8f377a1b9d399dbf83c5fec5330e0570f27ac07aa9a11,2024-05-17T02:27:49.327000 CVE-2023-38020,0,0,c1a3e43867e9d72a298a543040b6cb59eef078f91f668f177194a59f028fba8e,2024-02-09T18:44:32.197000 @@ -228852,7 +228855,7 @@ CVE-2023-38519,0,0,6feaff72ade735a2704fe8b8d9fef165f38317b422d397afb665c1d949162 CVE-2023-3852,0,0,2e1924f99097894c16104baab278a5a9ebf2db30430b465cf669815f850b7012,2024-05-17T02:27:53.627000 CVE-2023-38520,0,0,197a50cf0e44468d0337f27c399e1eb786a843546ac6c93f4b96fc50b52947ed,2024-06-04T16:57:41.053000 CVE-2023-38521,0,0,db18a9cb610e915922179831c59c7c6fe34d72db737eedb8a3400ffd344e745d,2023-09-08T06:42:06.290000 -CVE-2023-38522,0,0,50bf829b6b52038bf2d38c0b1bf32c25623a47f6d9cb7bc81bbf82c6ef10fb44,2024-08-01T13:44:16.693000 +CVE-2023-38522,0,1,401fd9824fc98a507aca78cc7a85a7f2df19d6e78b6d29af8bc4a614835ee5d3,2024-08-12T13:38:32.837000 CVE-2023-38523,0,0,4aeddda5cda4b987f05bc442064079c7a51cd36ed6a7d399ee18b0f7f42fa30b,2023-08-01T15:24:35.470000 CVE-2023-38524,0,0,c9e82639b2360f7e976dd3c089d1e601c218712b31ea68380c38a40a316e9b16,2024-06-11T12:15:10.860000 CVE-2023-38525,0,0,a4b40a45af79e11e4c16594d15803bcacdf8a6cc50b68a023dfce812a89911bf,2024-06-11T12:15:11.073000 @@ -230101,7 +230104,7 @@ CVE-2023-40154,0,0,6db426d68f75684e01202401e3ecbe622403876ecbe4560542d2a6ae15228 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000 CVE-2023-40158,0,0,ea9ecbd6acdb9ee425f0387337774eb7bca92a549c7bbb73ec67e17a1e55242b,2023-08-29T14:35:53.187000 -CVE-2023-40159,0,1,f2189ddda21142091f7afaf12ae1c1c97015aae3c0d230ec09afd142cf98c0b8,2024-07-19T13:01:44.567000 +CVE-2023-40159,0,0,f2189ddda21142091f7afaf12ae1c1c97015aae3c0d230ec09afd142cf98c0b8,2024-07-19T13:01:44.567000 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000 CVE-2023-40160,0,0,de8c32a875ccf6f89392dafa209d66eda2b9b820e48facccb8082fc450366841,2024-03-18T01:53:02.353000 CVE-2023-40161,0,0,811acdcf20dca77f5e641cd172c1882f83d8fefd01d88b9229bb052c09bff4e9,2024-02-14T15:01:46.050000 @@ -230163,7 +230166,7 @@ CVE-2023-40219,0,0,771f66a87abf8df69cce91491665e525ddb3d080b9e78bf4734e3298840cb CVE-2023-4022,0,0,d6b23d4a259ff425e0bcea23f81328a67bb6e3c44aa2685891847b3db1b81338,2023-11-07T04:22:03.600000 CVE-2023-40220,0,0,89c4602906f60678a7794892d3cd5810d595c00980d101471846882934615bc4,2023-11-22T15:13:46.893000 CVE-2023-40221,0,0,07a08113f156f3de39dd4d1e359a0a4257aade3850f8b1892f5b60e564039931,2024-08-02T19:15:44.160000 -CVE-2023-40223,0,1,00228ee436f9cad07872ce3cfc831e789a56c4170159a38f0e0d53302e42b8a0,2024-07-19T13:01:44.567000 +CVE-2023-40223,0,0,00228ee436f9cad07872ce3cfc831e789a56c4170159a38f0e0d53302e42b8a0,2024-07-19T13:01:44.567000 CVE-2023-40224,0,0,fe7ff7e2259903cb6a2b8a487e5657d52b403fb11aed6d8e638eabcae3a7d45a,2023-11-17T05:15:12.387000 CVE-2023-40225,0,0,4211aba8908007a30e95209432ab11366dbf58cece809a97f23ca0a3fb4772c7,2023-08-18T20:03:17.290000 CVE-2023-4023,0,0,9994c1fc2e5c266fe881d2394936c6b00f055b3f4cc90c0fb1f5d28d281ef9df,2023-11-07T04:22:03.717000 @@ -230297,7 +230300,7 @@ CVE-2023-40394,0,0,526da955586233b1a7b2dc9d999b1f0be86354cdad86453374676f9733b00 CVE-2023-40395,0,0,8951a0da5934955ebf0f075ae9e557422fd4c66d3267f9876fe4bc4a0543d4dc,2023-11-07T04:20:13.073000 CVE-2023-40396,0,0,e1517e772ec4dbc05a3aef534f3a4d927ba0243756be018ecf915193c20bdb5c,2024-08-01T13:44:31.750000 CVE-2023-40397,0,0,48f5d35694eda11e063d524064bdc097e2aab2bd9e9d13544e89fbc0b53f0c7b,2024-01-05T14:15:47.920000 -CVE-2023-40398,0,1,f693540076962c4cb3f2d3772b7089ed3374029dd4029ff3357391f5cd15140b,2024-07-30T13:33:30.653000 +CVE-2023-40398,0,0,f693540076962c4cb3f2d3772b7089ed3374029dd4029ff3357391f5cd15140b,2024-07-30T13:33:30.653000 CVE-2023-40399,0,0,091e5a2db15fd5f665ca444b78b62be5004d4abcf322f2dee4eb3017386c844e,2023-11-07T04:20:13.200000 CVE-2023-4040,0,0,e11728f161945388107c8ae43690a4d8736e1afb7e958f898d615bcdea0c7a50,2023-11-07T04:22:04.223000 CVE-2023-40400,0,0,40794a10c4c9163312504f098de9ecd9780321feca619f02675db3767c324753,2023-12-22T16:10:51.593000 @@ -230439,7 +230442,7 @@ CVE-2023-40534,0,0,e8ece95a9c479f54fdd96184c96036c3ca75ef517f90de3d989a08bfce9bf CVE-2023-40535,0,0,3dd8b6e353e77bc78b3eaf66d47e8a5e362a0b31feec7a87804f2cc657d03e6f,2023-09-08T18:49:20.803000 CVE-2023-40536,0,0,9551e2fe36c80eabdc1a2e97ded6be800d2fb9f544e15a4ec84bb644eba227af,2024-05-17T18:36:05.263000 CVE-2023-40537,0,0,75f58d7d08cd8fb906c24aefd5bbf6d6b69c82ba74790056d8b068a8723a2e25,2023-10-19T16:43:11.323000 -CVE-2023-40539,0,1,745533ec70bda2433fbf357624856ed729befe670b654b70dd477d9bbefc7f34,2024-07-19T13:01:44.567000 +CVE-2023-40539,0,0,745533ec70bda2433fbf357624856ed729befe670b654b70dd477d9bbefc7f34,2024-07-19T13:01:44.567000 CVE-2023-4054,0,0,53238c21c0a1eb83d08a1b3d2d86562b494ce0912d3fd29acf557c382ca3a9f1,2023-08-07T14:51:09.667000 CVE-2023-40540,0,0,1e03a01e888f27e7c3ca51db2a4bc2550b4a2afd268bf6a33f8cdd0d825d3736,2023-11-22T15:13:18.220000 CVE-2023-40541,0,0,daaec126802b21cc7a612331601c83efdf2fbb147626236fb6df03c2ce8ee7c6,2023-10-12T02:32:07.413000 @@ -230595,7 +230598,7 @@ CVE-2023-40699,0,0,1c71007d49a9bda3bb25ac8a38884f2ffc429a510e5d9039d4e8477ec5b0a CVE-2023-4070,0,0,a493fa1b62788c24fea8f8fc21746dc89c9760da767bd18023dad9b52c2e8327,2024-01-31T17:15:13.767000 CVE-2023-40702,0,0,62d180282da772c8c0e58ade691879d7f1cf512a29de8bc9063c44bdbe2af130,2024-07-09T18:18:38.713000 CVE-2023-40703,0,0,35695eb835fa32a192b950c3dccf44faf04da11a8e115230e010144a1f1eab33,2023-12-01T19:13:28.487000 -CVE-2023-40704,0,1,d9dfb9254d0ad99cd798ccea1340777c3c2114cd2ed62ec614ed5a91321e3fbe,2024-07-19T13:01:44.567000 +CVE-2023-40704,0,0,d9dfb9254d0ad99cd798ccea1340777c3c2114cd2ed62ec614ed5a91321e3fbe,2024-07-19T13:01:44.567000 CVE-2023-40705,0,0,1eda5b358ba0f37be10f436ec87d2f785a6beaf853d5f29bdc0c3fdfc74c06ad,2023-09-08T18:48:31.770000 CVE-2023-40706,0,0,adbd436305697d32e2e9942a03d182f6db0acd7a4fd1ad3603994bd286cace6d,2023-08-29T23:34:50.430000 CVE-2023-40707,0,0,673cbc0c873be97cb20c7bf02c23c637a814b2305c2831ca2a42955e398c3f06,2023-08-29T23:34:10.753000 @@ -232226,7 +232229,7 @@ CVE-2023-42920,0,0,967029ebc9d2fa13e49b3b2a7e43266d0af79ef15d4513e03a7c68b3187f3 CVE-2023-42922,0,0,d462ec8a37d9ad76a8353a6b4d7d79094fede2b875e86ffc84e579e57a42a188,2023-12-14T14:05:30.140000 CVE-2023-42923,0,0,2718c43e187a8424615b9f8de717d1e9605fa64e6eb699c03e6b09fc5d5d64d5,2023-12-13T21:19:46.137000 CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa779,2023-12-13T21:17:10.803000 -CVE-2023-42925,0,1,c5f67cd9139a311f7cd68469f3d36fd1373096c8bf5481749a1efaa281a19455,2024-07-30T13:33:30.653000 +CVE-2023-42925,0,0,c5f67cd9139a311f7cd68469f3d36fd1373096c8bf5481749a1efaa281a19455,2024-07-30T13:33:30.653000 CVE-2023-42926,0,0,10536a0e5d0896ff760b50cd54c1cef47c09b911f9aeabee54318eada99b22f1,2024-02-02T03:11:34.350000 CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000 CVE-2023-42928,0,0,22aa3a2e4e0e0621b755fab05358d10340fe6ca794f9e924d8a66423ddc1e866,2024-08-01T13:44:49.103000 @@ -232246,12 +232249,12 @@ CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f80 CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000 CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000 CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000 -CVE-2023-42943,0,1,fc6c82aade2f5314022689e679c544c24af355da6d750327c45ce4110a11d661,2024-07-30T13:33:30.653000 +CVE-2023-42943,0,0,fc6c82aade2f5314022689e679c544c24af355da6d750327c45ce4110a11d661,2024-07-30T13:33:30.653000 CVE-2023-42945,0,0,a06b1aec09c4d06c83c2ecc43e93c97ac1de84ec55101d5962c5f9ba2c7586a9,2024-02-22T19:07:27.197000 CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000 CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000 -CVE-2023-42948,0,1,dad3fd89df68b3e6e7e843ab4f2b158402e3d27a2558ec4c543ca56e83e9124a,2024-07-30T13:33:30.653000 -CVE-2023-42949,0,1,1e0bda6eac1c0c4fb6b56fe9297c8a002d859a42d6f443217af02cb620982f02,2024-07-30T13:33:30.653000 +CVE-2023-42948,0,0,dad3fd89df68b3e6e7e843ab4f2b158402e3d27a2558ec4c543ca56e83e9124a,2024-07-30T13:33:30.653000 +CVE-2023-42949,0,0,1e0bda6eac1c0c4fb6b56fe9297c8a002d859a42d6f443217af02cb620982f02,2024-07-30T13:33:30.653000 CVE-2023-4295,0,0,ec334b74dcc01539baa3eed8300f24e0d43c22b250be6de255e7d71ca4f97cb4,2023-12-28T17:14:36.030000 CVE-2023-42950,0,0,f1d5850b892570a96c5f59ef6bdf8fbbd22dba2618afa507113cc84e9d5cfb6a,2024-08-09T16:35:02.990000 CVE-2023-42951,0,0,5599d72d1055314191c8db46df9d7c3c52edb7a93dbd3fb4d584b453f42b45e7,2024-02-22T19:07:27.197000 @@ -232260,7 +232263,7 @@ CVE-2023-42953,0,0,10e4b94939ee0a7c816d850e4e7befeb67bf5108acf30f852eb067399e688 CVE-2023-42954,0,0,065c350829c9b241771d1bca2f08dbf3f9951aa86fb8dbf545b8b0f102b1a850,2024-03-22T12:45:36.130000 CVE-2023-42955,0,0,048bd99f0ab58fd5fb77045b6c0168d4d4fb97b035ea28ad7d10928caea120b4,2024-07-03T01:41:33.800000 CVE-2023-42956,0,0,66b0dda941d2a4925cbdb9e601d4277739f51c5e0165d598d707e4a6d9b3fb9b,2024-06-12T10:15:27.210000 -CVE-2023-42957,0,1,117394c84a5999038b88475cf3898216376dfb010ffa8f794d488afd0d0fb104,2024-07-30T13:33:30.653000 +CVE-2023-42957,0,0,117394c84a5999038b88475cf3898216376dfb010ffa8f794d488afd0d0fb104,2024-07-30T13:33:30.653000 CVE-2023-42958,0,0,760598b0abc36aab49bd8bbc215415c35c61f0968e0fe7feac7b2f6189acf5d9,2024-08-01T13:44:50.180000 CVE-2023-42959,0,0,12f3e1f633059524305473e9c00809cb86b8280a007b09c56c5f657aca98d63e,2024-08-01T13:44:50.437000 CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000 @@ -237499,7 +237502,9 @@ CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9 CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000 CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 CVE-2023-50808,0,0,fdda8b2a0cfebb77f7058e23eb97529dc58109b1d79d83d871b7079f7d6bdb52,2024-02-13T18:23:02.393000 +CVE-2023-50809,1,1,c22d5d6a64b0f7146b83bbce68d802394ff6fde1ce54f8bfa0f84597869fedfe,2024-08-12T13:41:36.517000 CVE-2023-5081,0,0,7787e17d39eb5438b4b32a6bbefdad7b23a6aea7d5f6a904017d2dc838411573,2024-01-26T16:02:59.793000 +CVE-2023-50810,1,1,6492bdf75c2b301fa0f50100d35e9e142bc6ab9b4353ae99c6ec739a1c5fa54b,2024-08-12T13:41:36.517000 CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000 CVE-2023-5082,0,0,f1b6df4433c50955b466bebd7c4d10790a8c0df9b9f9b615c6456254fa1fb163,2023-11-14T15:33:18.273000 CVE-2023-50821,0,0,9fbe459b4fd0202b0f005ddc745a01aaa0796a2e9731b864da13cc11ff66f119,2024-07-09T12:15:10.570000 @@ -239473,7 +239478,7 @@ CVE-2023-5661,0,0,a8f782375b300b7d78af7bd98b330b9364357a6e77e012c354724b66437556 CVE-2023-5662,0,0,b45ef98c17698e0e67ac9e3cb9349236eae662dd9a7247b69f605002dbdb4636,2023-11-28T19:26:56.350000 CVE-2023-5663,0,0,d5e407243156e86fa0581dd763a88be9d37f24ecb0a4ade2a322cc92a4946ea7,2024-03-13T18:16:18.563000 CVE-2023-5664,0,0,f2d53adc1e76901063ed6f899784436cee466240e93662d2da0e1821a1554e52,2023-11-28T19:23:15.107000 -CVE-2023-5665,0,0,983eac9ce885b9156e9c2843abff809e8c9aae4c5cedd378f6694006dcd0b1b8,2024-03-05T20:23:44.463000 +CVE-2023-5665,0,1,392b75bda9f9d36ec9a8ca5f140dc6271380c5e7c3be53343200be06df74770b,2024-08-12T13:38:12.337000 CVE-2023-5666,0,0,f2483079ef5e97ae7a96cbca91496e168943ff44509841e8947dbd9938d11d16,2023-11-13T14:50:14.593000 CVE-2023-5667,0,0,fbfb8124df78a0e2dcd7753130f3011a0359b4cb50cba47b2030ab1ae3cf7f4a,2023-11-28T19:22:46.013000 CVE-2023-5668,0,0,ceb0ea397eb6f67ac3a609571d1cca2680e2c13d72754d3b95dbf74e9c4230a0,2023-11-07T04:24:14.117000 @@ -240871,7 +240876,7 @@ CVE-2023-7242,0,0,44437b40e4f0999fecb90a66f5c5768d3d477fd014e68039a994ef2fdb74bf CVE-2023-7243,0,0,cdfbc820213bf124169ca9b8e9d8b6596e0121512589b1d250ce8eaae400cd18,2024-03-07T17:51:08.413000 CVE-2023-7244,0,0,167bffb73965b6b1d51346cdd70948d0b03120fd099b92c4ff80445f861f1f72,2024-03-07T17:51:19 CVE-2023-7245,0,0,a421df92ce644454fe097795d1da0ec80380ee5cbb65aae1a0ad296b590de092,2024-02-20T19:50:53.960000 -CVE-2023-7246,0,1,050d4503ff5d2fc1e4ed53053f9ee9630c64fe69870c591a8ba326c5d224f69a,2024-08-05T16:35:04.410000 +CVE-2023-7246,0,0,050d4503ff5d2fc1e4ed53053f9ee9630c64fe69870c591a8ba326c5d224f69a,2024-08-05T16:35:04.410000 CVE-2023-7247,0,0,3c451c661c0927b53e39951e13124c8c8a971760a04aa2ebc49094f73aca31eb,2024-03-12T12:40:13.500000 CVE-2023-7248,0,0,89fb0153d5d95a0d63adb7f25676b5b6c97388e661ba5f8924ac36ffce0f3f87,2024-07-26T19:11:49.893000 CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000 @@ -240971,12 +240976,14 @@ CVE-2024-0097,0,0,828e0d6edaac74d80e85e7cd248c4487f7d9ed2e02d8d361934a62f860a855 CVE-2024-0098,0,0,069a5c23019341513ba5e45eb7cd80085fa3c5305327bc38e3233b2410f520d3,2024-05-14T16:13:02.773000 CVE-2024-0099,0,0,a353a072382bc9c8f100deeb43f065f1ec38735a442f0652f39ff4a5b9a341a3,2024-06-17T12:43:31.090000 CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fdca,2024-05-14T16:13:02.773000 -CVE-2024-0101,0,1,23c2c60aa2a7aeedf3e9bbc8a7c79d9624fa404c4dbd86a993b865d216205651,2024-08-08T18:55:19.180000 -CVE-2024-0102,0,1,476d23a037899f61dedb3b0b21f826d7286ca045123349c57e1a25fffab3c078,2024-08-08T18:55:19.180000 +CVE-2024-0101,0,0,23c2c60aa2a7aeedf3e9bbc8a7c79d9624fa404c4dbd86a993b865d216205651,2024-08-08T18:55:19.180000 +CVE-2024-0102,0,0,476d23a037899f61dedb3b0b21f826d7286ca045123349c57e1a25fffab3c078,2024-08-08T18:55:19.180000 CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000 -CVE-2024-0104,0,1,6595bfebe996acef1097f81c3222472df485634a19ada40e2df8b906b135763a,2024-08-08T18:55:19.180000 -CVE-2024-0107,0,1,2670b459a089ae5f3cd0aa7028750cb59c956e51bd2d2b4d1317045f653eac3f,2024-08-08T18:55:19.180000 -CVE-2024-0108,0,1,5d44d156a42931d34be8718fccfbc54a1ca3396e038fd79a34eb85bdcafe7c82,2024-08-08T18:55:19.180000 +CVE-2024-0104,0,0,6595bfebe996acef1097f81c3222472df485634a19ada40e2df8b906b135763a,2024-08-08T18:55:19.180000 +CVE-2024-0107,0,0,2670b459a089ae5f3cd0aa7028750cb59c956e51bd2d2b4d1317045f653eac3f,2024-08-08T18:55:19.180000 +CVE-2024-0108,0,0,5d44d156a42931d34be8718fccfbc54a1ca3396e038fd79a34eb85bdcafe7c82,2024-08-08T18:55:19.180000 +CVE-2024-0113,1,1,2b77377c2d0895ba2ee15f8b65532b738440e593d0ebd4d57dc3c29e44a29204,2024-08-12T13:41:36.517000 +CVE-2024-0115,1,1,37eb1b718efea2b269b4d0ee608b3c484a6739bde55669c1e516759714918e38,2024-08-12T13:41:36.517000 CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000 CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000 @@ -241141,7 +241148,7 @@ CVE-2024-0333,0,0,9eaf58c044c101ac9ee4da325dc0cbe7baa26316edb9c32b68718e9200d8ba CVE-2024-0334,0,0,f64e24da86d08ef5624336a0a2ef7f631f77b98c0c17027395f19c584275ec3f,2024-05-01T19:50:25.633000 CVE-2024-0335,0,0,8c70dc4c2c1cd890e3b797d6942fd50c3abf750fef2989b9ac71c6205ee38bbc,2024-04-04T12:48:41.700000 CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000 -CVE-2024-0337,0,1,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000 +CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000 CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000 CVE-2024-0340,0,0,5ec2804644638da5aac37972a6dfa8986b5d547c399c8d6caf485759e479bbb2,2024-06-27T13:15:54.380000 CVE-2024-0341,0,0,680923dff3cdc70d6ba9942573970086160b44b5db51b08f3c7252eed19e3791,2024-05-17T02:34:31.867000 @@ -241630,7 +241637,7 @@ CVE-2024-0851,0,0,f71017226a428253d7e6f7557fb0ae0457b9beec038f9e66758c71c8032e79 CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b72,2024-05-03T13:15:21.320000 CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000 CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000 -CVE-2024-0856,0,1,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000 +CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000 CVE-2024-0857,0,0,eb17afdc7dc1bf92b321f990519fddd6b2895b42e203d3876b1bb54222e90b64,2024-07-22T09:15:04.457000 CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000 CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000 @@ -242169,7 +242176,7 @@ CVE-2024-1423,0,0,cf9424b269ea30f1f1f93fb8aca6f7020e19a4ef0b7ad3a1dcf8f2e9317f18 CVE-2024-1424,0,0,cbd136bf1f98159598da2ccacf0216bc65edcce77e49ac9e42a04169c1f20ae0,2024-04-10T13:24:00.070000 CVE-2024-1425,0,0,fe9673f53ce8ba7e1d490b309db2e514b2c3d669d64333fb63d542e31263bd5b,2024-02-29T13:49:29.390000 CVE-2024-1426,0,0,58297813532bddd72ed4f278824b8276e78c437596064bf3a5aa32ce1b481317,2024-04-18T13:04:28.900000 -CVE-2024-1427,0,1,cab6a0307295e866b43ac26f256e1637a37d7a2b197239c60a9da244492c16fe,2024-07-03T15:44:40.083000 +CVE-2024-1427,0,0,cab6a0307295e866b43ac26f256e1637a37d7a2b197239c60a9da244492c16fe,2024-07-03T15:44:40.083000 CVE-2024-1428,0,0,3cc3b1a9efed5e9bd932f5f4b32240359ff16f5465557beabc74530c2a820d28,2024-04-08T18:48:40.217000 CVE-2024-1429,0,0,e6662f9b0f545f55c7ee8bcb23a23604a89d336e239381f2a1bde6ff8a245229,2024-04-18T13:04:28.900000 CVE-2024-1430,0,0,ef81ff8ea93da260e0cf142a8655e5514bc882c889fab8073e73da3e691de793,2024-05-17T02:35:26.640000 @@ -242674,7 +242681,7 @@ CVE-2024-1979,0,0,f1a0351d1eda12becd3435a620ae713e38d9788c71a098be9a3dd09ef524f3 CVE-2024-1980,0,0,d05d6a10f51fa5cb95450081d05531b2a97dcdb5a95466a13c126d057076b9b9,2024-05-31T15:15:09.393000 CVE-2024-1981,0,0,ff6b795c812d9078e836adffaedd102596e0450fd579a51bc38e05c66232e472,2024-02-29T13:49:29.390000 CVE-2024-1982,0,0,55283e8328bd4d99495fa8f4a93d6fb1609e0cf1d39c6e77124b91a15850a564,2024-02-29T13:49:29.390000 -CVE-2024-1983,0,1,d00264a06e15cfa77dfe3e312c698ed41eee00e3021645ab24e4dcb2acdbf646,2024-08-01T20:35:24.517000 +CVE-2024-1983,0,0,d00264a06e15cfa77dfe3e312c698ed41eee00e3021645ab24e4dcb2acdbf646,2024-08-01T20:35:24.517000 CVE-2024-1984,0,0,0df5f78cf6f051e72d7153fa9aaf52ccd4fe0017e9b67b93f803c09a232964a7,2024-04-10T13:23:38.787000 CVE-2024-1985,0,0,1459c7f573c3744b2b1652f27b199f79aabe6c56cefc45a9b4a45ee58d612ad3,2024-03-13T18:15:58.530000 CVE-2024-1986,0,0,4ef9e64d76ba71a51e1573d6242f316d4be047372da694274254226bd1edf605,2024-03-08T14:02:57.420000 @@ -242913,14 +242920,14 @@ CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992a CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000 -CVE-2024-20443,0,1,86985cea506792fec440f8b6b2739d2e35aa1fc2e0b4daa7824077914f21656d,2024-08-07T19:09:46.290000 +CVE-2024-20443,0,0,86985cea506792fec440f8b6b2739d2e35aa1fc2e0b4daa7824077914f21656d,2024-08-07T19:09:46.290000 CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000 -CVE-2024-20450,0,1,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35a9a,2024-08-07T19:09:46.290000 -CVE-2024-20451,0,1,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000 -CVE-2024-20454,0,1,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6ed1,2024-08-07T19:09:46.290000 +CVE-2024-20450,0,0,cfe46dc7826c305ab98574cf72ddea7d365b2634d22c5b3d211ce8df40e35a9a,2024-08-07T19:09:46.290000 +CVE-2024-20451,0,0,5716a06bbe518ce49d6f96da365d23009de45980184470eb3ddec420dfc210c3,2024-08-07T19:09:46.290000 +CVE-2024-20454,0,0,82704fb503b7059454a85ef30e98f2c90abd21a5c3b3087fb54fa9f88dce6ed1,2024-08-07T19:09:46.290000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 -CVE-2024-20479,0,1,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000 +CVE-2024-20479,0,0,e43b191fa2d4610d4436c6122b2a02d0645e504181a7e15baaa05c8cae8fe0da,2024-08-07T19:09:46.290000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 @@ -243504,7 +243511,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 -CVE-2024-21302,0,0,7f6be6351d47c6a64561e28034d49c773122587883b9b42530ed13522aa84047,2024-08-08T13:04:18.753000 +CVE-2024-21302,0,1,df8f48a708f29d6a063dc79d8f57f836f5c70be4e601cd7ad60ce5ad39a85126,2024-08-12T13:38:14.373000 CVE-2024-21303,0,0,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000 CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000 CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000 @@ -243846,7 +243853,7 @@ CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea7371041 CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000 CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000 CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000 -CVE-2024-2169,0,1,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 +CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 @@ -243968,7 +243975,13 @@ CVE-2024-2187,0,0,a8936a0952b83c5ba88ca6cea81f9850e57edc6e1289ba1fdb9217f4cb3f21 CVE-2024-21870,0,0,261e723ef3190c288a9a8c3f8500f3cefd68fef15433091d79f48a8358a48f68,2024-04-03T17:24:18.150000 CVE-2024-21872,0,0,53e0faa097226f02f7b28a1019bf889e7e0fb2883871bfc21fe50f5bf87c752b,2024-05-28T17:15:09.413000 CVE-2024-21875,0,0,e1e3188e4a1a3daa309eabb8117102a0dc6d3aa5e89a469bc9ead0ec383c37f9,2024-04-12T07:15:08.283000 +CVE-2024-21876,1,1,eb0ec092c77858845ffcf8d8d5ddfc8f9fc12cc6e1a95d04cedbbf52072bb501,2024-08-12T13:41:36.517000 +CVE-2024-21877,1,1,879a4eccee4850d01a0c18677066b811afe95c8ea4d5053437c763f3ff15cc80,2024-08-12T13:41:36.517000 +CVE-2024-21878,1,1,7bf118ac648370f3ee6ed107358ed89bb2fa1b33566413306574f79261b08659,2024-08-12T13:41:36.517000 +CVE-2024-21879,1,1,b1d5fbfebd7c5dd2b21f72ba45c051eb2ab05c10f2b7234d0a764cfe1a926e95,2024-08-12T13:41:36.517000 CVE-2024-2188,0,0,f6397330df5f65b18ad2d13528904ddd0555534adf5d38b75b356026fc82ff57,2024-03-05T13:41:01.900000 +CVE-2024-21880,1,1,588e0599dc4b382942d62944b9a5752507b00c13e9424d1db8558e9d527c738f,2024-08-12T13:41:36.517000 +CVE-2024-21881,1,1,8189c2870a0bb55bff29af70e3103759597c3e0c6282532223808b8139b55025,2024-08-12T13:41:36.517000 CVE-2024-21885,0,0,70c81d50395e4cc90ed76dbf187dcd1d6628b16e28d002b6bd3113eae9355653,2024-08-01T23:35:23.987000 CVE-2024-21886,0,0,d9ed72d5cc76ab779e42960fcab2b1d8ba99a9322ac8a915c7bbeae73a4df89b,2024-05-22T17:16:14.343000 CVE-2024-21887,0,0,dee851222e694d95b0f1691d3a26fa26718084755139b924be089cf79647c8cc,2024-06-10T16:21:07.127000 @@ -244075,14 +244088,14 @@ CVE-2024-22069,0,0,8736d3376ede1cdd91f0d1f324b2a4a6d69da2d548a6d3cef750a255a951f CVE-2024-22074,0,0,a1a776748154594eabd5bedbe0254430e590ea44ffb88bfb446bfd71a59f69e3,2024-06-07T14:56:05.647000 CVE-2024-22075,0,0,a5af4a36684a159511579f89d3ce85206e57c3558ab3a4b37d02f2a846a5e5f1,2024-01-10T15:06:42.563000 CVE-2024-22076,0,0,ad579321d212e2fb374b8124959febe687d1d1197907430ed2ba5046da4cb421,2024-02-22T02:15:49.207000 -CVE-2024-22077,0,1,0d574f900f6ba15af6753de47087b404e70b7e744d15c464a0473f8e5a0b02bf,2024-08-03T20:35:03.080000 -CVE-2024-22078,0,1,c3b627a8d9530c86e600e0d77428d42d2cac56a9e2e764e54289f580eb21986a,2024-08-03T20:35:03.900000 -CVE-2024-22079,0,1,a5fb20f55d8f9537903329da7f5c9ffbfc7d484fdf2939c2e12794fce7097349,2024-08-05T17:35:06.653000 -CVE-2024-22080,0,1,3c2aa85feb9de94fb127eeb3fca8bdefb063fc3762182aefb69679535f4aa9bb,2024-08-02T17:35:32.227000 -CVE-2024-22081,0,1,bed08a40d6b19e09bab70b425c59fbf3887df0cc93105a6e39818d7b24bd2715,2024-08-05T20:35:03.437000 -CVE-2024-22082,0,1,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000 +CVE-2024-22077,0,0,0d574f900f6ba15af6753de47087b404e70b7e744d15c464a0473f8e5a0b02bf,2024-08-03T20:35:03.080000 +CVE-2024-22078,0,0,c3b627a8d9530c86e600e0d77428d42d2cac56a9e2e764e54289f580eb21986a,2024-08-03T20:35:03.900000 +CVE-2024-22079,0,0,a5fb20f55d8f9537903329da7f5c9ffbfc7d484fdf2939c2e12794fce7097349,2024-08-05T17:35:06.653000 +CVE-2024-22080,0,0,3c2aa85feb9de94fb127eeb3fca8bdefb063fc3762182aefb69679535f4aa9bb,2024-08-02T17:35:32.227000 +CVE-2024-22081,0,0,bed08a40d6b19e09bab70b425c59fbf3887df0cc93105a6e39818d7b24bd2715,2024-08-05T20:35:03.437000 +CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000 CVE-2024-22083,0,0,92f0490fd172f0bc793c7af9bec8f9da4b251f44763111a947de01e1595dcdfa,2024-03-20T13:00:16.367000 -CVE-2024-22084,0,1,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000 +CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000 CVE-2024-22085,0,0,9f73c9bc03a826548f205ce294099b0729076b132c6281041c731ecbb77d3293,2024-03-20T13:00:16.367000 CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000 CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000 @@ -244107,9 +244120,14 @@ CVE-2024-22107,0,0,64d7edf67861f2aea41c988e2079065b0ec1cd38f81bbea72ea4457990c09 CVE-2024-22108,0,0,ea9416ff38e82db4d89f422aa521b9f43cdfda08ac0452ecfa3b97765a1ecbeb,2024-02-09T19:39:12.853000 CVE-2024-2211,0,0,05480e51a3be1a04ffc8c792d1598e0bb76f2a87ae83af92a3cec09f51086e05,2024-03-06T15:18:08.093000 CVE-2024-22113,0,0,13db1784c83c707f65c71b4cba39eb52868092157c2e93186447ad786b8101cf,2024-01-29T14:23:46.600000 +CVE-2024-22114,1,1,85b54ec2b885c135e45b03175bd136d049dbed1525830da6d04cf6a3aa9187fb,2024-08-12T13:41:36.517000 +CVE-2024-22116,1,1,f0b5ebe8ba4f463f8dfa18b80962e57798bc7ca7e8b677d0b02c8a86d2542d37,2024-08-12T13:41:36.517000 CVE-2024-22119,0,0,bab5d1250fcd6f1a1cd43309c34479a872d2f802d868b87d856c55058b7e578d,2024-04-28T20:15:45.757000 CVE-2024-2212,0,0,be13cbfb4ebfba5aea4c193e4a0db60e8d52926fc0c6f15b80d0ac3ffc4e7b0a,2024-06-10T19:15:53.270000 CVE-2024-22120,0,0,5c7d79f246e863ac440ce51ad2418fa0c9fd789e2d6f8af1ee1505bd6de82c10,2024-05-17T18:35:35.070000 +CVE-2024-22121,1,1,a3f7dbbb0bf48aef8aedc0cb137eee50914fe8f2d96b32886754c64a80a7a6ed,2024-08-12T13:41:36.517000 +CVE-2024-22122,1,1,6032dc94670493bc9e93bae5f4d9f9cb3e365b8470bafdc9054b8040619a17a3,2024-08-12T13:41:36.517000 +CVE-2024-22123,1,1,518502e0018cd913da004fe917b5ce9e5b14074974f8333d3dd3300f3c7ec5b8,2024-08-12T13:41:36.517000 CVE-2024-22124,0,0,ae727126e60d9cde8ef5e51668c38a883080195512277d1a80e4217d8781fb3c,2024-01-22T19:17:13.050000 CVE-2024-22125,0,0,45e3a9c2ec5632f05c6eeeb6aeaaf2c6d04ed3da2f62c2fdc1ffee6c0b199240,2024-01-12T19:42:36.637000 CVE-2024-22126,0,0,55b92bff57264ddea9fe0233e3f58f8f377eef5ff007efe1315e715ea4e8c27b,2024-02-13T14:01:40.577000 @@ -244576,7 +244594,7 @@ CVE-2024-22851,0,0,bca50b43839bb5a9440c8cbeb408fd89f180d58427aad27d09e9a965c6eb8 CVE-2024-22852,0,0,8ae9b682c67cb845884ddd035899d91b91d18dec5a1d45bf6dc8c5eb275039b7,2024-02-13T18:16:51.790000 CVE-2024-22853,0,0,bc89e715c02ccddcdd7224ca8b312fb06ea03063bc4da2eba5ae6389033cf42c,2024-02-12T17:50:31.950000 CVE-2024-22854,0,0,5045ec0eb46cc9957b314234176075bf70dad7874976a26a9f1b267a9db8e5b2,2024-02-16T13:37:51.433000 -CVE-2024-22855,0,1,978cea221cbe34e7be3e94946577d6e11833682bc78df01e6099f3765bab7431,2024-07-22T20:12:59.693000 +CVE-2024-22855,0,0,978cea221cbe34e7be3e94946577d6e11833682bc78df01e6099f3765bab7431,2024-07-22T20:12:59.693000 CVE-2024-22856,0,0,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 CVE-2024-22857,0,0,480d6ec154598b2115e1c0fff46a01b03a1975a4bbbd9d81d163798d069f2161,2024-04-19T01:15:06.297000 CVE-2024-22859,0,0,c789fd1319ae29200cfda38411ba15b951620161f2106b97557558350eee1281,2024-08-01T23:15:38.057000 @@ -244667,7 +244685,7 @@ CVE-2024-23084,0,0,f277ffef2808b71ee81115ff1cb4f188dee4659bf4a7ead284f09486269b1 CVE-2024-23085,0,0,c2d4a833e275adaea75d4721a85180117d94ed467e962dd33323527ca073d13c,2024-08-01T23:15:40.570000 CVE-2024-23086,0,0,89628d19c526ab52b9632a83c3b6f0fe544645afa7ae6ca603f80e9a673376ff,2024-08-01T23:15:40.650000 CVE-2024-2309,0,0,b4bab766083001057d63d861d742eba6fb7b051d100b953adf8a9460cad67846,2024-07-03T01:53:08.927000 -CVE-2024-23091,0,1,df238df795e6d17b705ec9a9e5cb5066f9e7d6d1c218e1461a675acaa6ae1192,2024-07-31T12:57:02.300000 +CVE-2024-23091,0,0,df238df795e6d17b705ec9a9e5cb5066f9e7d6d1c218e1461a675acaa6ae1192,2024-07-31T12:57:02.300000 CVE-2024-23094,0,0,b3be5d271cf78aadb59fda5aaee79baaaf5b6075dd9f37b3166eb28ef143d682,2024-08-01T13:47:04.610000 CVE-2024-2310,0,0,499b89515ad327ded91d404511ae8dcfd3fae99d14d1816e5fc98cd9421d4da6,2024-07-03T01:53:09.113000 CVE-2024-23105,0,0,b6c7dcc2141f6a5f9b64f4fa2deaa854669f89b7d4c0ddd615de0435e0b10df0,2024-05-23T15:52:39.123000 @@ -244815,7 +244833,7 @@ CVE-2024-23258,0,0,dee83e7f7f5ed1c3a1d8a3468f9f35c6db6dab8eafb2a604bfe9a51903ddb CVE-2024-23259,0,0,32180f50b016e600303bef490f7c44972cd0819551854177dd2a129ee13314e5,2024-03-13T21:15:57.180000 CVE-2024-2326,0,0,3c8b37146da325cce38aec51267ca4284760cd42c72a832b281add7789332b70,2024-03-25T01:51:01.223000 CVE-2024-23260,0,0,cfbcfeb19854283a9e5066e6e8e5e90d2605569101e96973822703b992d8a487,2024-03-13T21:15:57.227000 -CVE-2024-23261,0,1,831aad9b856e0c8bc5531ec718ef8971b6b5e400a71edd396c581dad6c48dc72,2024-07-30T13:32:45.943000 +CVE-2024-23261,0,0,831aad9b856e0c8bc5531ec718ef8971b6b5e400a71edd396c581dad6c48dc72,2024-07-30T13:32:45.943000 CVE-2024-23262,0,0,62d9ca66899810aa5c6562616e9cb31025a85566f240255b691a56f330edff70,2024-03-13T23:15:46.790000 CVE-2024-23263,0,0,d226157fc33b45c7e307e7b0bb570cfcc69dc1555ae79726ac7dbaf98cfcacab,2024-07-03T01:47:42.140000 CVE-2024-23264,0,0,e8679cdfb620ed4032710b82b0ab29602601551c60ac1c22de87e1638374eb53,2024-03-13T23:15:46.883000 @@ -244961,14 +244979,14 @@ CVE-2024-23462,0,0,89eee1bc8417ec5c165498a10c45118559ef0ab7b53f75c35dd8c8aeefb82 CVE-2024-23463,0,0,3757d1676f1ef0efc7fd06c5dbfd1e77b5a81f192ccd6411055b5756d98980c9,2024-04-30T17:52:35.057000 CVE-2024-23464,0,0,f96ace951d186b2988bc125fdea8c86f0397bed95b21593fc51223e1b64bb834,2024-08-07T21:23:59.990000 CVE-2024-23465,0,0,a4c1ec35f04e9fdf474cd87b3c2aafdeacdae5a8eab83da2bfa5a53b38af34f6,2024-07-18T12:28:43.707000 -CVE-2024-23466,0,1,63423335f501e582f6269fc9353787aeb4dadd9ceac96da8594c28144e574628,2024-07-18T12:28:43.707000 -CVE-2024-23467,0,1,5c86ed0c4cd13fd5925dd08e4b0d9d462c31ba7560e982c8660271250292a002,2024-07-18T12:28:43.707000 -CVE-2024-23468,0,1,7442e7a1f95905e4c846579344b9b898257e33405e23ada18e8a7677ffa37903,2024-07-18T12:28:43.707000 +CVE-2024-23466,0,0,63423335f501e582f6269fc9353787aeb4dadd9ceac96da8594c28144e574628,2024-07-18T12:28:43.707000 +CVE-2024-23467,0,0,5c86ed0c4cd13fd5925dd08e4b0d9d462c31ba7560e982c8660271250292a002,2024-07-18T12:28:43.707000 +CVE-2024-23468,0,0,7442e7a1f95905e4c846579344b9b898257e33405e23ada18e8a7677ffa37903,2024-07-18T12:28:43.707000 CVE-2024-23469,0,0,05b78d88e5a9305969bd12b72fe36d95687a40703caf5cbe6f8f531283cef4a1,2024-07-18T12:28:43.707000 CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000 CVE-2024-23470,0,0,21f957f5830ba7f3cb8f0b5cba3b3cc643e8f559e292c381232ffecb2aac58c4,2024-07-18T12:28:43.707000 CVE-2024-23471,0,0,fe11efd17d8239a398506b0c207c833c4f64b5421ad9bbfff0c7a3f2189764bd,2024-07-18T12:28:43.707000 -CVE-2024-23472,0,1,9a4b2e7518963b9428772791dd10c9920fae883a7f99eac490a84e4c123ba003,2024-07-18T12:28:43.707000 +CVE-2024-23472,0,0,9a4b2e7518963b9428772791dd10c9920fae883a7f99eac490a84e4c123ba003,2024-07-18T12:28:43.707000 CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000 CVE-2024-23474,0,0,5b83eda1571f8d586afa7fdf61e84b7ee80ad4b928c31e2fb19bed55c0b0f5c1,2024-07-18T12:28:43.707000 CVE-2024-23475,0,0,c393da98bbb9d83c6eda41c7438e97e9e7abcbedc909c6a49411cef32a15193c,2024-07-18T12:28:43.707000 @@ -245542,7 +245560,7 @@ CVE-2024-24332,0,0,061392bccd873408c89db0e96815bf2edd50add3d02e20d0ccce713baa35a CVE-2024-24333,0,0,242255791f359917c9577e9e1908f59331e2d2d00004e6f9f8172875fc23ff9c,2024-02-01T04:50:09.707000 CVE-2024-24334,0,0,2fc19e7bbfc8d6f8ab140ae138a0d497f7aa7001981d6f838304497cc65c0be6,2024-08-01T13:47:25.807000 CVE-2024-24335,0,0,ffcc3f8e28a1440d1fe2b8cc01711656e7fc5c04d9d5a1913e0292e820ddbfcc,2024-08-01T13:47:26.587000 -CVE-2024-24336,0,1,a5ccb0fbff083ac5c184ed3fdead1df5cecc5e934d7340485971ea972219e0fc,2024-08-06T18:35:01.670000 +CVE-2024-24336,0,0,a5ccb0fbff083ac5c184ed3fdead1df5cecc5e934d7340485971ea972219e0fc,2024-08-06T18:35:01.670000 CVE-2024-24337,0,0,094f8cc47d42a08478d1d6a24f80eb2610489628ad3a80aaaec39b738e46aa7c,2024-02-13T14:01:49.147000 CVE-2024-2434,0,0,fd07f7ab5e2f479dc9adc0f83447a443eff6e1d59e7754fcb9d00da68e153f33,2024-04-25T13:18:02.660000 CVE-2024-2435,0,0,4d8896815b0c7c529a361f99e45df509239f44d321920fde4e2deb77682c98a4,2024-04-02T18:12:16.283000 @@ -246190,7 +246208,7 @@ CVE-2024-25394,0,0,be9935f7dc1f2a9ef5bc4751361c0c48070487f3d65e34adb53e8eab07ac2 CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000 CVE-2024-25398,0,0,d9ed4e2578e708fde238a2333f8c06b711d373daa3ef2c157ba58fb7d13ba18b,2024-02-28T14:07:00.563000 CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 -CVE-2024-25400,0,0,30fd5077eec50c9d66e6fab9e3c65e6c93f08ada3fcabad9edfedb3b13c04f96,2024-08-02T00:15:29.923000 +CVE-2024-25400,0,1,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000 CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000 CVE-2024-25410,0,0,da2543318fbb8275cd16936f8a754d30f1d50739901afbcb1ba92647c65cf519,2024-04-03T21:15:31.220000 CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000 @@ -247887,7 +247905,7 @@ CVE-2024-2750,0,0,37727f710079f44007aa4b3f740cc1e5c5b0086f375c812c16d7e3bf2db192 CVE-2024-27507,0,0,553b05ae6ffd373dfbf2aa3222522f3386658a0a78887ec1a5a87ad22402f8cf,2024-03-23T03:15:11.443000 CVE-2024-27508,0,0,b265a2d0929e770552ce2e0e5af61c90534f4c3dc6d68203c9b14af4a39731ac,2024-02-28T14:07:00.563000 CVE-2024-2751,0,0,e0380b41cfa9755453969621f95a77af0ea62dd5295ce9849e6c35313a94c34e,2024-05-02T18:00:37.360000 -CVE-2024-27515,0,1,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000 +CVE-2024-27515,0,0,3f190b29b377831cc24590b4a1f853471b234f4a1c7e2d52c2e51f41a12a57d4,2024-08-05T18:35:12.953000 CVE-2024-27516,0,0,3dc18d3982e9b3ac9d2998b4f4d3df66c427d5d211641c6aee2d4c423b9aacd1,2024-07-03T01:50:41.420000 CVE-2024-27517,0,0,5e97f075b436a5c8f2e51d28a398abf4c938438e6f3743132df7b78060b7cc66,2024-02-29T13:49:29.390000 CVE-2024-27518,0,0,d812237f641178f6bc686b6c229d69abdd7eae6ab50b55b6efd5c619ffb68b42,2024-04-30T13:11:16.690000 @@ -248033,7 +248051,7 @@ CVE-2024-27805,0,0,80bf48e5a18746668d82dbc585fcdc5e0dc3f16985a0a47b63c1fdbef2db8 CVE-2024-27806,0,0,28c67af34cc68b2a5a6c23ba0a23708c28b0ee7df3bcafd7c779ecd50c264c63,2024-07-02T13:29:21.613000 CVE-2024-27807,0,0,a7b781fd7f96d6bc57a085fc734d11b31dcdd4417a6ae278ff1c40e2b1bf7128,2024-07-02T13:33:44.157000 CVE-2024-27808,0,0,0e786fcdc7ac7f7247d972ac7ba3fbaa92c628a0afe531fe3d853f6df664bccf,2024-07-03T01:50:52.903000 -CVE-2024-27809,0,1,0ec0aef9f4327f1daa0683dd7a09acc44b4a2d6dc1f976c5f8ce513c12bdc08b,2024-07-30T13:32:45.943000 +CVE-2024-27809,0,0,0ec0aef9f4327f1daa0683dd7a09acc44b4a2d6dc1f976c5f8ce513c12bdc08b,2024-07-30T13:32:45.943000 CVE-2024-2781,0,0,97e23bf2edd148fde295ed4a38d42212ed940660bc04c9822025b8526dedd073,2024-03-27T12:29:30.307000 CVE-2024-27810,0,0,131d49a9ababc6e1b56ddd9789d941a01f074ae704d1acea7c3e5f91ec92a79f,2024-07-03T01:50:53.720000 CVE-2024-27811,0,0,cf157c9c893021758020e95900f9b13420c68cf22fe15e38b0a93ed47fe613e0,2024-07-03T01:50:54.533000 @@ -248049,7 +248067,7 @@ CVE-2024-2782,0,0,680a3c329ce925b550d110698489929aa37484a831dec13218a370944105b9 CVE-2024-27820,0,0,a1605198dcbf5219cf280b9649bff24b5d5f9453251b177f1725c884a033aed8,2024-07-03T01:50:58.540000 CVE-2024-27821,0,0,859f99fab905ef1166138895d787ba4493c361245367a651e31b7d6ae013da4b,2024-08-01T13:48:48.400000 CVE-2024-27822,0,0,00b8edec8aa3387668b84ecf0596531970e488898abd3e050f82e3809ca5cb58,2024-07-03T01:50:59.383000 -CVE-2024-27823,0,1,4fe22a8a018063587d4281e0c177847093d57bf3caccc68013900340838044f2,2024-07-30T13:32:45.943000 +CVE-2024-27823,0,0,4fe22a8a018063587d4281e0c177847093d57bf3caccc68013900340838044f2,2024-07-30T13:32:45.943000 CVE-2024-27824,0,0,cfe0a7920280ea0d9d140a2d290380bd855b41db7ee5997d8431d6aeecb6b082,2024-08-01T13:48:49.263000 CVE-2024-27825,0,0,56d745c63f5923700ccb89bf72b89b53d35743fee3115939c5b740b7e01f6df0,2024-07-03T01:51:00.263000 CVE-2024-27826,0,0,468573d9f6d4f3e64c896464447e70aea3125e0a6b505b53e9da444d184f5392,2024-08-01T13:48:49.460000 @@ -248080,21 +248098,21 @@ CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794 CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000 CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000 CVE-2024-27852,0,0,9c516bed02a09c2aff2aa4b9ea5d528517ae4b8f02f5b13e3e44ea400df8e7a3,2024-06-10T18:15:29.900000 -CVE-2024-27853,0,1,2e123d465c3bf1443bc357b72d9b59ceb16f5eb3ffb9b7d5fae5ee79e4787c7d,2024-07-30T13:32:45.943000 +CVE-2024-27853,0,0,2e123d465c3bf1443bc357b72d9b59ceb16f5eb3ffb9b7d5fae5ee79e4787c7d,2024-07-30T13:32:45.943000 CVE-2024-27855,0,0,e4901bc850a7c0f79eade81e1de0a193a7e166d4d71678ff74681ab03b5418a8,2024-08-01T13:48:51.967000 CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000 CVE-2024-2786,0,0,8ed89c394db0a4298af6ad355228ba4ef878fdf7e45e835968fbe7eb06ba76d1,2024-04-10T13:23:38.787000 CVE-2024-27862,0,0,6a1c629c4e6507b4b49035253caa6ee93e62b8be69739e75e90d1bcc9a884e42,2024-08-01T14:35:05.210000 -CVE-2024-27863,0,1,fd83495c934568c34aaaa65c9a15a1b3559e7cc32f8c7a5957d4052bb44f4f88,2024-07-30T13:32:45.943000 +CVE-2024-27863,0,0,fd83495c934568c34aaaa65c9a15a1b3559e7cc32f8c7a5957d4052bb44f4f88,2024-07-30T13:32:45.943000 CVE-2024-27867,0,0,c8c0bef10450917c014bb0f5b8c10be2f4bd90c5c93e6cf14274f5f577a33a76,2024-07-04T05:15:15.540000 CVE-2024-2787,0,0,2d4ec32358f3e4fff4e28d01c0d898cc511d2c65fccc3f39ec557fb8f116ac98,2024-04-10T13:23:38.787000 -CVE-2024-27871,0,1,dfe3a9264a4cfa6e2d8d1be26b936b2845d3f7dd3e7a15245bda2a519976e610,2024-07-30T13:32:45.943000 -CVE-2024-27872,0,1,b6d66f216b2114c1b77473827dbf591abfee0d72e616023817dbc7f09c2d9c0e,2024-07-30T13:32:45.943000 -CVE-2024-27873,0,1,4dee3ce0084563ccb7865212d758b08faa4be2fec284803858c4a77d9c8117e2,2024-07-30T13:32:45.943000 +CVE-2024-27871,0,0,dfe3a9264a4cfa6e2d8d1be26b936b2845d3f7dd3e7a15245bda2a519976e610,2024-07-30T13:32:45.943000 +CVE-2024-27872,0,0,b6d66f216b2114c1b77473827dbf591abfee0d72e616023817dbc7f09c2d9c0e,2024-07-30T13:32:45.943000 +CVE-2024-27873,0,0,4dee3ce0084563ccb7865212d758b08faa4be2fec284803858c4a77d9c8117e2,2024-07-30T13:32:45.943000 CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29c1a,2024-08-09T17:02:19.750000 CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000 CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000 -CVE-2024-27881,0,1,6afd9f87fafeb826eaa3a6402ee6d0351c4562f692aa76e6b34d561c97200b1f,2024-07-30T13:32:45.943000 +CVE-2024-27881,0,0,6afd9f87fafeb826eaa3a6402ee6d0351c4562f692aa76e6b34d561c97200b1f,2024-07-30T13:32:45.943000 CVE-2024-27882,0,0,5f6b8c776d129a743847181e673fbc08fa4525f477938bb4131e477f4d230687,2024-07-30T13:32:45.943000 CVE-2024-27883,0,0,a0ddd934b377fc709fb4c9c5999258197501ae8a4c900c5f15b38ef425986e01,2024-07-30T13:32:45.943000 CVE-2024-27884,0,0,c8b7a89e085d35ad0c448e616c336654f520047f390f2d4a8df19df20362a2a2,2024-07-30T13:32:45.943000 @@ -248429,7 +248447,7 @@ CVE-2024-28276,0,0,896aecad1efc32d8d7d4be681490a5d3b704ace3d21bddf1f6c90eed4ecf9 CVE-2024-28277,0,0,11d55096db4a6f8daf8d5b5c78d2c8d6c9326505ca094e2c49ca8ad7bf77760d,2024-05-14T16:13:02.773000 CVE-2024-28279,0,0,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000 CVE-2024-2828,0,0,8900d844f8cfc7f7690e29cda848c134f6d2f92cdafcde758804b06ac18f0c75,2024-05-17T02:38:33.097000 -CVE-2024-28283,0,1,8c964af2debb02be4bf42774a10a108d98f03db965bff337f64552cf0b90de18,2024-08-06T16:35:08.440000 +CVE-2024-28283,0,0,8c964af2debb02be4bf42774a10a108d98f03db965bff337f64552cf0b90de18,2024-08-06T16:35:08.440000 CVE-2024-28285,0,0,b6090c2daf8acd83058bc5c38daa9c85b2dd7e03912cb9ab7c02f296ed5f619c,2024-05-14T16:13:02.773000 CVE-2024-28286,0,0,4f67e5d2b8d61419daa7b3eeda1ea695486dcdadf2fd66eaccee73d47ef998e4,2024-08-05T19:35:04.997000 CVE-2024-28287,0,0,a03ed8e7226853da71a23e5d5fa49a49b41307581cd8848e54e22e0bb77457fd,2024-04-02T18:12:16.283000 @@ -248437,7 +248455,7 @@ CVE-2024-28288,0,0,f98f2f651d1f736446516dbdbf0d5790dba9ff7967167e34d1d283eb510a3 CVE-2024-2829,0,0,a34e30cdbcaace33af6819d27727866fac8140ba32c20702ce2f1d25edf955a7,2024-04-25T13:18:02.660000 CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000 -CVE-2024-28298,0,1,42fe0255b1ba9d0b1671873946fa54d976be8caa5214aa1370df457890f075b5,2024-08-05T12:41:45.957000 +CVE-2024-28298,0,0,42fe0255b1ba9d0b1671873946fa54d976be8caa5214aa1370df457890f075b5,2024-08-05T12:41:45.957000 CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e2337499741,2024-04-04T12:48:41.700000 CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000 CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000 @@ -248469,14 +248487,14 @@ CVE-2024-28383,0,0,4f219d7792abda13457e0e7109dbcec02126c96db4d4d7351ad6ca7dc5eaa CVE-2024-28386,0,0,66019518bfc4d7d8b99177df8793b456d0a0650171ffc1d7c8f3433563b85df5,2024-08-01T13:49:03.327000 CVE-2024-28387,0,0,af4c90d656accc5b2d132269cbcc25e25573278fd5f53e46eeb301cb514b39cf,2024-08-01T19:36:04.890000 CVE-2024-28388,0,0,575d4968aa541f7d6ef0da0b573c9a8bb55aa2b590b70d0372139e0de2630184,2024-03-14T12:52:09.877000 -CVE-2024-28389,0,1,42acf6cbaebdc461cce2af35b74679c9d1c81ce9114564911b85ebeaf88a2bac,2024-08-02T16:35:40.323000 +CVE-2024-28389,0,0,42acf6cbaebdc461cce2af35b74679c9d1c81ce9114564911b85ebeaf88a2bac,2024-08-02T16:35:40.323000 CVE-2024-2839,0,0,ee45053b5ac83eae18c1a71d98f9817e7025bc9d7e049918f01e284843f64c90,2024-04-02T12:50:42.233000 CVE-2024-28390,0,0,8e966fdec021f459642300414ff272480719a8ad797893b6828dff0c5c67b98e,2024-03-14T12:52:09.877000 CVE-2024-28391,0,0,1612464a5045a9dcbfbed51b4145357f41a0970daedd21315ce2194196825398,2024-08-01T13:49:04.167000 CVE-2024-28392,0,0,5824697cb412e64caabb20f46b93c113a811b02735a0ef2ece011572dc931f0d,2024-03-20T17:18:26.603000 CVE-2024-28393,0,0,04c598367976d9977c43beb15b030d893b4ef27f3405bd598ddf167ac93764fc,2024-03-25T16:43:06.137000 -CVE-2024-28394,0,1,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000 -CVE-2024-28395,0,1,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000 +CVE-2024-28394,0,0,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000 +CVE-2024-28395,0,0,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000 CVE-2024-28396,0,0,e2e5ec394ca570d1a0e7ca873049e09f9ea87c9a858dde784a7ae9cd510f7e8a,2024-03-20T17:18:26.603000 CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000 CVE-2024-2840,0,0,d22529ec081718c114a32dcf5767c6cdef3a269eb91ab5eeb1189d10f2a33e86,2024-05-02T18:00:37.360000 @@ -248540,31 +248558,31 @@ CVE-2024-28562,0,0,aedaf708d3b18197d691f16e4924977de0b5623e261911d3fbbbaf3604c34 CVE-2024-28563,0,0,a76a8c0b981d93846eaf9f675982e2266f870d6c33b80aaee30a9eb94f23d95b,2024-07-03T01:51:43.500000 CVE-2024-28564,0,0,8ce27ca743d312f75ad4ec281e9f5dbff639d2f4d99d632c783daa019f10048e,2024-05-01T18:15:17.460000 CVE-2024-28565,0,0,67f054920a683c9ff4a8bb4e9fd8358086a3370b6a221e02c15e3d7e27c0feec,2024-05-01T18:15:17.513000 -CVE-2024-28566,0,1,2e0016af850982aa60890a5c70f74ddb1f006304aaca70fa40b549891174432f,2024-08-02T19:35:27.200000 -CVE-2024-28567,0,1,1fbda14ca5c066f5197f6bfd970b5e6607506a43068d2624b1de8dc822d70067,2024-08-02T19:35:27.990000 -CVE-2024-28568,0,1,a70bfd8e4571206dfd87545fdaf8b723a948df1f3176a3c6fa84ca9ce559ca36,2024-08-02T19:35:28.773000 -CVE-2024-28569,0,1,ad60495b3b813c0e1c1f69dd2b7ee289faff857a94e624cd53889c6dcb2ea7e0,2024-08-05T19:35:06.577000 +CVE-2024-28566,0,0,2e0016af850982aa60890a5c70f74ddb1f006304aaca70fa40b549891174432f,2024-08-02T19:35:27.200000 +CVE-2024-28567,0,0,1fbda14ca5c066f5197f6bfd970b5e6607506a43068d2624b1de8dc822d70067,2024-08-02T19:35:27.990000 +CVE-2024-28568,0,0,a70bfd8e4571206dfd87545fdaf8b723a948df1f3176a3c6fa84ca9ce559ca36,2024-08-02T19:35:28.773000 +CVE-2024-28569,0,0,ad60495b3b813c0e1c1f69dd2b7ee289faff857a94e624cd53889c6dcb2ea7e0,2024-08-05T19:35:06.577000 CVE-2024-2857,0,0,6b7f0ed41aa8fffc986484ee4966eb88f104c5cd9592dc192e8b535b500353ad,2024-08-09T19:35:06.033000 -CVE-2024-28570,0,1,2478994d61c0797c3b646a3798f0d2f2f73a3c6063c01be960ec6a79426d7643,2024-08-02T17:35:35.437000 +CVE-2024-28570,0,0,2478994d61c0797c3b646a3798f0d2f2f73a3c6063c01be960ec6a79426d7643,2024-08-02T17:35:35.437000 CVE-2024-28571,0,0,344f54bc69f01b8717fc97e4f8cff03a33443957b678eec9bcaac923efec61a3,2024-03-20T13:00:16.367000 -CVE-2024-28572,0,1,8d8c0771c652934bbfb858bf6776db7b744df7c977f72ac4db0e0e73a3333814,2024-08-05T19:35:07.547000 -CVE-2024-28573,0,1,59be671c020a246acaa354bf074907149c6d91b577d4a37bb212bbf3b4274c92,2024-08-02T19:35:29.543000 -CVE-2024-28574,0,1,24788acca02194a589e8eecf2dc2fd740a0daf13a36443f87a3b0e1026e37eb0,2024-08-02T19:35:30.327000 -CVE-2024-28575,0,1,9be50845091c7b1decbb62e99fdaf886c15a91f55cc05c6054e9512f35037e25,2024-08-02T19:35:31.100000 -CVE-2024-28576,0,1,0023e23f87c9a5ed976660765548aaa2a8d7f1acb051f9bfea5d6d034ac8f2fb,2024-08-05T19:35:08.503000 -CVE-2024-28577,0,1,2638b078a3299565fe3cafbf9e6ebbbe11685bd86cb9e159e2aec23f7331bc1d,2024-08-02T17:35:36.253000 -CVE-2024-28578,0,1,59c818fe41c1e21240329d09d19331117d7409a3cb25f8b4cd72998d515dff43,2024-08-05T20:35:08.080000 -CVE-2024-28579,0,1,94f072676c369db357ccf5a15e66f7c10c37a0528bf49b5ff02b5da0932ef50e,2024-08-05T19:35:09.520000 +CVE-2024-28572,0,0,8d8c0771c652934bbfb858bf6776db7b744df7c977f72ac4db0e0e73a3333814,2024-08-05T19:35:07.547000 +CVE-2024-28573,0,0,59be671c020a246acaa354bf074907149c6d91b577d4a37bb212bbf3b4274c92,2024-08-02T19:35:29.543000 +CVE-2024-28574,0,0,24788acca02194a589e8eecf2dc2fd740a0daf13a36443f87a3b0e1026e37eb0,2024-08-02T19:35:30.327000 +CVE-2024-28575,0,0,9be50845091c7b1decbb62e99fdaf886c15a91f55cc05c6054e9512f35037e25,2024-08-02T19:35:31.100000 +CVE-2024-28576,0,0,0023e23f87c9a5ed976660765548aaa2a8d7f1acb051f9bfea5d6d034ac8f2fb,2024-08-05T19:35:08.503000 +CVE-2024-28577,0,0,2638b078a3299565fe3cafbf9e6ebbbe11685bd86cb9e159e2aec23f7331bc1d,2024-08-02T17:35:36.253000 +CVE-2024-28578,0,0,59c818fe41c1e21240329d09d19331117d7409a3cb25f8b4cd72998d515dff43,2024-08-05T20:35:08.080000 +CVE-2024-28579,0,0,94f072676c369db357ccf5a15e66f7c10c37a0528bf49b5ff02b5da0932ef50e,2024-08-05T19:35:09.520000 CVE-2024-2858,0,0,77de78ffe5efb8a5ccda4b7ac1093000021db9681f722435169147a187be6d02,2024-08-01T13:49:55.107000 -CVE-2024-28580,0,1,dcfba5ba26abe3633d2cb397f0b193efd8cd40fa63fdb35a8729b737295cc958,2024-08-02T19:35:31.910000 -CVE-2024-28581,0,1,751998c13f0f3b4912a9b5840b020eaf629f3ac6e0579483e5f8b424a776edd1,2024-08-02T19:35:32.690000 -CVE-2024-28582,0,1,07714b816f6cea27cbaeed61c7a34a8549b3f48b988174c802fe73b974416155,2024-08-02T19:35:33.543000 -CVE-2024-28583,0,1,c50dbed0562dfacbb674c7718f0ced726fbccebfa73bed4edf17a8a5f2a5babf,2024-08-05T18:35:15.813000 +CVE-2024-28580,0,0,dcfba5ba26abe3633d2cb397f0b193efd8cd40fa63fdb35a8729b737295cc958,2024-08-02T19:35:31.910000 +CVE-2024-28581,0,0,751998c13f0f3b4912a9b5840b020eaf629f3ac6e0579483e5f8b424a776edd1,2024-08-02T19:35:32.690000 +CVE-2024-28582,0,0,07714b816f6cea27cbaeed61c7a34a8549b3f48b988174c802fe73b974416155,2024-08-02T19:35:33.543000 +CVE-2024-28583,0,0,c50dbed0562dfacbb674c7718f0ced726fbccebfa73bed4edf17a8a5f2a5babf,2024-08-05T18:35:15.813000 CVE-2024-28584,0,0,7e195d8460271436a238e3083d5d571c24596d55b31fa43f7b5e39a74de45a89,2024-05-01T18:15:17.567000 CVE-2024-28589,0,0,b66eede795a00f4b0e2e204a9cf88f1852abc341145eb3db72506b72341d3af9,2024-08-01T13:49:10.093000 CVE-2024-2859,0,0,bafc6fbac9167165f0e9f3436109d788f5070653afb075f2a33513a8544a14d7,2024-08-01T13:49:55.310000 CVE-2024-28593,0,0,386f7584615dbd06bce0d2890654b96180b7240f382d5dfb6184dc4e00226988,2024-08-02T01:15:50.050000 -CVE-2024-28595,0,1,28b08a22e292280ed95f64d32a76e87e49c8a1f0e5d06776faecd0f8ab19c93c,2024-08-02T17:35:37.053000 +CVE-2024-28595,0,0,28b08a22e292280ed95f64d32a76e87e49c8a1f0e5d06776faecd0f8ab19c93c,2024-08-02T17:35:37.053000 CVE-2024-2860,0,0,46217b9da2b2fddda54a23d86fd9667171b5afae15a6ec5a04d81b349c2499a5,2024-05-08T13:15:00.690000 CVE-2024-2861,0,0,978a1015efa40b0403e35a6152b7f5d6b235fd3f9d4adac2eb469279c47e40ff,2024-05-24T01:15:30.977000 CVE-2024-28613,0,0,a54ab1f2e9b074c0005ceac95268c51f4526b7bbad2e62927797643c18df7693,2024-04-24T13:39:42.883000 @@ -248782,7 +248800,7 @@ CVE-2024-28957,0,0,0b6f09541cc545197668690ffbf9310f75a4b5c2876755b3d8d95cbf05284 CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000 CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000 CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000 -CVE-2024-28962,0,1,a96effbf83c42c6de037f267cb741b7ad8c0c1cba3ce445c3f138895f41093ff,2024-08-06T16:30:24.547000 +CVE-2024-28962,0,0,a96effbf83c42c6de037f267cb741b7ad8c0c1cba3ce445c3f138895f41093ff,2024-08-06T16:30:24.547000 CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000 CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000 CVE-2024-28965,0,0,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000 @@ -248805,7 +248823,7 @@ CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808 CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000 CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 -CVE-2024-28992,0,1,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000 +CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000 CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000 CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000 CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000 @@ -248887,6 +248905,7 @@ CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165 CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000 CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 CVE-2024-29080,0,0,122d2248f2a74104ef56e4b4f36a007e3f0c20d936565d94fb482f471e756277,2024-07-22T13:00:53.287000 +CVE-2024-29082,1,1,b486df86c49451007ceaf6a641b45edb73f14e6b661ab57fd8dccb41fa7e78be,2024-08-12T13:41:36.517000 CVE-2024-29086,0,0,a506e441c3bf25764a8b903d5765d986b768db67b23cfb3ff53fe13b9a27e4ba,2024-04-02T12:50:42.233000 CVE-2024-29089,0,0,0e8f97a635f9f0c1a64450754b2a18a9e0c4596034f0fadf2dfda26a23dacbbd,2024-03-20T13:00:16.367000 CVE-2024-2909,0,0,0e3061bf6a0e2ec3e09b8019aa64a03564628e11a8822cb14e5d6cf0553832b0,2024-05-17T02:38:36.843000 @@ -249073,7 +249092,7 @@ CVE-2024-2935,0,0,7d689f5767f4ecf1da00999595f1a425d48847fef9234facd7520ada78d3a3 CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000 CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000 CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000 -CVE-2024-2937,0,1,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000 +CVE-2024-2937,0,0,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000 CVE-2024-29374,0,0,d2ac5a721d12777649fcd030beb01ff2c11bea2c0dd1a7deea6b2cbbb441b4fa,2024-03-21T19:47:03.943000 CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000 CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000 @@ -249288,6 +249307,7 @@ CVE-2024-29828,0,0,cf7a11dfb0bacf870956fd60f8fa5514bb20d6de121717190a179ee970816 CVE-2024-29829,0,0,2627c3c538089236c07fc9d99ff01f8523c0ad4c659196fc4e8a6a2fbde2ef8b,2024-07-03T01:52:43.970000 CVE-2024-2983,0,0,abc742578b147dd833a35242cc5e48a9d8a95389fdc1a304f0712a489693567d,2024-05-17T02:38:40.503000 CVE-2024-29830,0,0,18395a43d7ad8c4a3ef4b143a126bb1f7f474279d280a4d068388e15b7d7d9c8,2024-07-03T01:52:44.693000 +CVE-2024-29831,1,1,c018173ca0f23a7de7cba8c19de4d93d9116061680d907e71077202fdd436712,2024-08-12T13:41:36.517000 CVE-2024-29832,0,0,5628e75296910cc53d7d3ce9845448a46f6d98d08c5de4831bcd92140b9423b7,2024-08-02T17:35:40.223000 CVE-2024-29833,0,0,d3b78818efea7db453c8c0c57b3f7cad1e10190868cd7a55b44e6fa1a741ca29,2024-08-02T17:35:40.943000 CVE-2024-29834,0,0,ddae7fa4556f0392c23c3408775967ee623cff8a7a3fe77a3d7f05d22cf73e88,2024-05-01T17:15:32.153000 @@ -249590,7 +249610,7 @@ CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000 CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000 CVE-2024-3017,0,0,b401b23402ebc6f6ec3d2296f1d5b4f9799017607076ff54b8bb35750200243b,2024-06-27T19:25:12.067000 -CVE-2024-30170,0,1,fef02ebf0456c4197e9e9b260021a36c1a3dea701171bba95242a863b53a4136,2024-08-06T16:35:12.080000 +CVE-2024-30170,0,0,fef02ebf0456c4197e9e9b260021a36c1a3dea701171bba95242a863b53a4136,2024-08-06T16:35:12.080000 CVE-2024-30171,0,0,a303030da6dd4ea6781306128867049fd2796ab1046058a6c2cefdda88e2976e,2024-06-14T13:15:51.603000 CVE-2024-30172,0,0,e23d65cae1ab6574d22c6026de16bab78b6c6028b759790600f9957da66d8b50,2024-06-14T13:15:51.730000 CVE-2024-30176,0,0,b9c656776bec57369b0fb415cb86239071847d4185cfc200250f61ff82ba37c3,2024-05-01T19:50:25.633000 @@ -249606,6 +249626,7 @@ CVE-2024-30184,0,0,77c9228d008326bd99ae127ca8e132427e74beec3c963f6478bcbcf355838 CVE-2024-30185,0,0,021fa2bb56fdb06083e9059af1891d4677f384120b9c9cff2bf7cdb9c84fa539,2024-03-27T12:29:30.307000 CVE-2024-30186,0,0,2c739b7180a604f892f32e45c0608cfe3aaa016f782853a55dd614d1b973db95,2024-03-27T12:29:30.307000 CVE-2024-30187,0,0,a87417506a6715324081b8a6732358ff8be0f886268063cb33d3fafba7ead39b,2024-03-25T13:47:14.087000 +CVE-2024-30188,1,1,f468ca05d4374d0c60aba28974fad643313ba0180569e88070dc4d131e2f2324,2024-08-12T13:41:36.517000 CVE-2024-30189,0,0,bea0641188c77d9ff9bf3c0d46eff997519b7c27956011c836ea03e42a1ac4c0,2024-04-09T12:48:04.090000 CVE-2024-3019,0,0,fc47f9f0e8d896280f4a2d46090d1bc0cf7b321d9a30221be0d2b03759c35ec9,2024-05-28T19:15:11.323000 CVE-2024-30190,0,0,6197fc9e34cc40d3a526d726b39a887eac4f870ec02db5e41ce0e5cd147b7ffc,2024-04-09T12:48:04.090000 @@ -249982,7 +250003,7 @@ CVE-2024-30556,0,0,e69233496d05a5aabce18d433e9ca2e5223239355a0fa678f93d89e5f2275 CVE-2024-30557,0,0,7d175e1542d96c0a09750c55f6339c21eedf49d306c5f65cdc0e1b0224f24694,2024-04-01T01:12:59.077000 CVE-2024-30558,0,0,2fd7f40103c9e6c9a5c23a9c51b6730af182169ea1b29c57e5612e917c42a577,2024-04-01T01:12:59.077000 CVE-2024-30559,0,0,7bb411cba178991a1e753b9b344d96e6c257adaaf46f6d70bda139a8b3d1fbcb,2024-04-01T01:12:59.077000 -CVE-2024-3056,0,1,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728df,2024-08-05T12:41:45.957000 +CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728df,2024-08-05T12:41:45.957000 CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000 CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000 CVE-2024-30564,0,0,92e98c5dcd641d0673e96635e88dfdb173d7997e6d4761f483834203fe7a9974,2024-04-26T04:15:09.020000 @@ -250131,8 +250152,8 @@ CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183e CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000 CVE-2024-30809,0,0,1fcb0fd8f1a39e7f469bccbb27a3f6f436aa5c361167acbe3a36e26117f3ec6d,2024-08-01T13:50:27.443000 CVE-2024-3081,0,0,01dfa9fbad742b3b5c96a84664fd07fad21a9856f0e0dafe766309ca8f119c58,2024-05-17T02:39:42.433000 -CVE-2024-3082,0,1,7ab110172d074157c5351ff4b42aa6efa7abead57545ca49351ced2bb41f2edb,2024-08-01T12:42:36.933000 -CVE-2024-3083,0,1,7f2c6889a93367b4fcdcb1e921e49e2a594e065c1621dff970dbce7c638c8725,2024-08-01T12:42:36.933000 +CVE-2024-3082,0,0,7ab110172d074157c5351ff4b42aa6efa7abead57545ca49351ced2bb41f2edb,2024-08-01T12:42:36.933000 +CVE-2024-3083,0,0,7f2c6889a93367b4fcdcb1e921e49e2a594e065c1621dff970dbce7c638c8725,2024-08-01T12:42:36.933000 CVE-2024-3084,0,0,305df29625577e6dd31738e34631201c5ea39f1d684ffd5f5306069a5e541323,2024-05-17T02:39:42.520000 CVE-2024-30840,0,0,86698626452936acf43a8d936d3a900102fb950ec252f61138428e4da09a69d2,2024-04-16T13:24:07.103000 CVE-2024-30845,0,0,76935f5a808359b33b84594c4799e1bfdd6b3d8771fa4780e8d409785d9dbe54,2024-04-15T13:15:51.577000 @@ -250312,21 +250333,21 @@ CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae765 CVE-2024-31143,0,0,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000 CVE-2024-3115,0,0,ce15a233f41ff0461e80772019f46030689b0b2d2d5c745fde6ced2663519f76,2024-06-28T13:22:33.400000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 -CVE-2024-31159,0,1,e66d8d9cea58f3b1fc92bfe2d5c491ab99dfaa6dd7820e51b7a7374704e602c3,2024-06-17T12:42:04.623000 +CVE-2024-31159,0,0,e66d8d9cea58f3b1fc92bfe2d5c491ab99dfaa6dd7820e51b7a7374704e602c3,2024-06-17T12:42:04.623000 CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000 -CVE-2024-31160,0,1,5d69b6e99584cf3f2c308dac70055dbff2d89abe3f873cc686c437a5d6fa401c,2024-06-17T12:42:04.623000 -CVE-2024-31161,0,1,4b56cc8c1091b2a23561c8d96308457d8ca0646f3640af5bc534a4e0c80e12b7,2024-06-17T12:42:04.623000 +CVE-2024-31160,0,0,5d69b6e99584cf3f2c308dac70055dbff2d89abe3f873cc686c437a5d6fa401c,2024-06-17T12:42:04.623000 +CVE-2024-31161,0,0,4b56cc8c1091b2a23561c8d96308457d8ca0646f3640af5bc534a4e0c80e12b7,2024-06-17T12:42:04.623000 CVE-2024-31162,0,0,927e844bb935e8a83ed32cc3c84a6f15334c1e57e0cf01b6b414adaae6ba411c,2024-06-17T12:42:04.623000 CVE-2024-31163,0,0,4c747f1ff7fba8b05c1cafd42ad5f820c8955e2e4c4106c43c9e7bc300a75bf4,2024-06-17T12:42:04.623000 CVE-2024-3117,0,0,35e12b7e221f89a241b3455a68aa778ef5d3a027d9a06e657b81a15f70aaf730,2024-05-17T02:39:43.503000 CVE-2024-3118,0,0,b601d08053b91d1b775fc21940190bf1fa2c378ab81a4eb84232fb172e159127,2024-05-17T02:39:43.597000 CVE-2024-3119,0,0,16d9b0b62041b85fa76fcca7b5e07a91c83d46800d8aa92445727479f196ac02,2024-04-10T13:23:38.787000 -CVE-2024-31199,0,1,11479192eb775fee5084856e54ab7ae00b8a69d1c838837c846493b9c8f25e7d,2024-08-01T12:42:36.933000 +CVE-2024-31199,0,0,11479192eb775fee5084856e54ab7ae00b8a69d1c838837c846493b9c8f25e7d,2024-08-01T12:42:36.933000 CVE-2024-3120,0,0,d7f7bfc68dc8954b2db64a2bd8494c9672b3ed1aa5b73de4b1ce504de0f2d9cd,2024-04-10T13:23:38.787000 -CVE-2024-31200,0,1,2be7a6c87104296b2ba118c6c93d1ddd899ab174a97908632fa0e6157716336e,2024-08-01T12:42:36.933000 -CVE-2024-31201,0,1,2cb43dc42c8bff271c186d61e8d323ddf8a1455b5509487c704ff0b39db29df8,2024-08-01T12:42:36.933000 -CVE-2024-31202,0,1,232fd8ab710b70f6658d5b29de433aa15ae152e69a18f8d6acb44309c356bebf,2024-08-01T12:42:36.933000 -CVE-2024-31203,0,1,c065cdeb48478ed8faeb16f6348ae82280e73662cd5feb4524a8b1d36c3ad779,2024-08-01T12:42:36.933000 +CVE-2024-31200,0,0,2be7a6c87104296b2ba118c6c93d1ddd899ab174a97908632fa0e6157716336e,2024-08-01T12:42:36.933000 +CVE-2024-31201,0,0,2cb43dc42c8bff271c186d61e8d323ddf8a1455b5509487c704ff0b39db29df8,2024-08-01T12:42:36.933000 +CVE-2024-31202,0,0,232fd8ab710b70f6658d5b29de433aa15ae152e69a18f8d6acb44309c356bebf,2024-08-01T12:42:36.933000 +CVE-2024-31203,0,0,c065cdeb48478ed8faeb16f6348ae82280e73662cd5feb4524a8b1d36c3ad779,2024-08-01T12:42:36.933000 CVE-2024-31204,0,0,0c2a3c505ae0850e947d758b18dc636095933b24d8a064505ce740f4cd47511f,2024-04-05T12:40:52.763000 CVE-2024-31205,0,0,8ee406c15331a2b7fb6924640608e3f9e6bdd36a95bd392fbee6658513096921,2024-04-08T18:48:40.217000 CVE-2024-31206,0,0,41949bb5f0c1bb5a03bd675fb7a934fe92393be2a48c12943c92c5612ae97e2d,2024-04-05T12:40:52.763000 @@ -250663,7 +250684,7 @@ CVE-2024-31613,0,0,b0b5b8479d0a02bfd478dd615b1866827cfc5a7cd6faf8622773f7f73500a CVE-2024-31615,0,0,d368b7afcddf8004edd5887f0583685e84be26fc0d3934bf749ef04013bb7fc3,2024-07-03T01:55:14.960000 CVE-2024-31616,0,0,1084c6c3d6d8aa5c511ab3dfa4028831dd239a202d2424f408608d0ae03fc34e,2024-07-03T01:55:15.753000 CVE-2024-31617,0,0,9711caaddce592eb420340c15062e32230529bacc3e145994358760fe387bd5a,2024-05-22T18:59:20.240000 -CVE-2024-3162,0,0,3e7f66649168580d392a3fb46c7ee7a96684035e106cd1b348efef813ec92f13,2024-04-03T12:38:04.840000 +CVE-2024-3162,0,1,6055b788868f695b3bc680357a22bdce9b7189f198b49fd13248d03c8a295953,2024-08-12T13:38:26.607000 CVE-2024-31621,0,0,2776499dd839a5f8af2f1a45cc3999696933a39c7fd80896ea803a98040f00f2,2024-08-01T13:51:02.777000 CVE-2024-31622,0,0,82a150679cb2e6aa18ce1c93441bf5438a3fa3ecf8dcd9f9d21f44c6655c4d69,2024-06-05T17:15:12.400000 CVE-2024-31623,0,0,2a7b23b063ff92a0f5ba44b11b8dd92d49aa1e1d3ce6dc0ea729e6c096ae1393,2024-06-05T17:15:12.510000 @@ -251448,6 +251469,7 @@ CVE-2024-3276,0,0,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1 CVE-2024-32760,0,0,8a4cdc5bcedb63264846221216208f424d8dc5b52e5ca3fc3e32534258ddc5b1,2024-06-10T18:15:34.203000 CVE-2024-32761,0,0,6f0bcd58c8810c383235a1c03265eeb31754d4f607b95d657c69e92af8f87390,2024-05-08T17:05:24.083000 CVE-2024-32764,0,0,cbd096bb04ee402e99d0d45a6cfbe8f32e2f75d2ff7a1df390f3f5f243db0155,2024-04-26T15:32:22.523000 +CVE-2024-32765,1,1,6f408fb1f4bce7bc92075b216a634b04f180f97a5c179102c90e4eadcea535c5,2024-08-12T13:41:36.517000 CVE-2024-32766,0,0,9d30325125ed70eb28a6908ff1f024ce0f6a7eaa4cb759703e88fcb2e840ce2c,2024-04-26T15:32:22.523000 CVE-2024-3277,0,0,b592398116a75f979391fd7af2ddcb8b25c0761ad60be8a878cb41360c56e23d,2024-05-30T13:15:41.297000 CVE-2024-32772,0,0,01d607098e736d0def6b40c8eb83d353249a9660360929859e991ce179c3c6fe,2024-04-24T13:39:42.883000 @@ -251468,6 +251490,7 @@ CVE-2024-32786,0,0,c8f72d25586ed84e6aedb2bd2ad61446cccfb909ab790d5607958a516b831 CVE-2024-32787,0,0,a4bce1922c953adab632d6a01abe0c6eac1fef4baf52caf7b5d16e9e6c71af7f,2024-06-10T02:52:08.267000 CVE-2024-32788,0,0,0d39d6ad48fc50332ab460c01b6b00e67801fda90a0435b82477dec9b560320f,2024-04-24T13:39:42.883000 CVE-2024-32789,0,0,a5f394d4f7f23079df9a63359dae91194863759106dba18d6bc7d78852e0a0d5,2024-04-24T13:39:42.883000 +CVE-2024-3279,1,1,02110755f5c27aa98fa676108bbab232305f51f0da6311b8981cd9354859b0f6,2024-08-12T13:41:36.517000 CVE-2024-32790,0,0,20ba451c6e62bff550db66dcd1b72fc07923ec4e6384c75372587ad30be2566a,2024-05-17T18:36:05.263000 CVE-2024-32791,0,0,52cc7c25428e4a1927940897584182cfcd101211e5cf85e1f4032364e9990a02,2024-04-24T13:39:42.883000 CVE-2024-32792,0,0,8bb785c71795dc8855ea4359218275de9d933edd6e202564760b8935f1e66d4b,2024-06-10T02:52:08.267000 @@ -252197,10 +252220,10 @@ CVE-2024-33953,0,0,63e46ea726d37d8745ea34fab8c10792202a96224f50f42661862439d0baa CVE-2024-33954,0,0,56971cf7819e69848d3a992a0087660ba05ca96712d3a36deca39fdf2a1bac6b,2024-05-14T16:12:23.490000 CVE-2024-33955,0,0,74cb745cdb62a336c3f876a0fd00b4b23bbd1044d9dae83da460a24660cf3426,2024-05-14T16:12:23.490000 CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc712f,2024-05-14T16:12:23.490000 -CVE-2024-33957,0,1,0e1e5f4730a34b23552c2231c245e18108db52e780fcaa99c647a1ead4fde0f9,2024-08-06T16:30:24.547000 -CVE-2024-33958,0,1,b573d372b0d7ecaf1ad956ff6d0a05063e98ba29cfc5e03db4b15bd271dc6f01,2024-08-06T16:30:24.547000 +CVE-2024-33957,0,0,0e1e5f4730a34b23552c2231c245e18108db52e780fcaa99c647a1ead4fde0f9,2024-08-06T16:30:24.547000 +CVE-2024-33958,0,0,b573d372b0d7ecaf1ad956ff6d0a05063e98ba29cfc5e03db4b15bd271dc6f01,2024-08-06T16:30:24.547000 CVE-2024-33959,0,0,7c0cd3b349dca2c5025b80d137d364d4b069eb5d0a51d215a853a38c247c583c,2024-08-08T21:02:25.943000 -CVE-2024-33960,0,1,2ad498d81eba49f4a5e7a393b8038b75bde51710a29054d602c822280c14c088,2024-08-06T16:30:24.547000 +CVE-2024-33960,0,0,2ad498d81eba49f4a5e7a393b8038b75bde51710a29054d602c822280c14c088,2024-08-06T16:30:24.547000 CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000 CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000 CVE-2024-33963,0,0,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000 @@ -252215,26 +252238,26 @@ CVE-2024-33971,0,0,a7859046d8372a909dcb2b37a15cf3347b7e31d10dadb7980f4c9fb8d7cb9 CVE-2024-33972,0,0,42dee7a80c44684711acc9909b4734c5fb83b699be5ad7e45fa494c43db80c3d,2024-08-08T15:25:18.450000 CVE-2024-33973,0,0,0a583261d2674aa7d4e2f3bbf7680a44773ad150514a793eca996581b9e8bd33,2024-08-08T15:24:35.547000 CVE-2024-33974,0,0,d280489cb050a80c8bcc0878f3de7456d028053d751ad633a2e500fbf3c9b3f8,2024-08-07T17:44:17.477000 -CVE-2024-33975,0,1,24d9f8b7189c6e049a2d195b8e70f6d865af89b6e07e97dd7c966c273f1ab8ce,2024-08-06T16:30:24.547000 -CVE-2024-33976,0,1,67f5f835747af0987a350b4d42b3bce1f04168a323132a627d10afd7d71c4f21,2024-08-06T16:30:24.547000 -CVE-2024-33977,0,1,405178aa69e8c523d5255a40363518e9f3def64819b4c1b13860e42870541184,2024-08-06T16:30:24.547000 -CVE-2024-33978,0,1,d9fa5afc6af12f1b1775f97e83f5db2f011fa6bd1262b6c0199a8a9aeedc346a,2024-08-06T16:30:24.547000 -CVE-2024-33979,0,1,dfed535c5c088c982cc982c913db9bd03e95887458fb5c6e3b8f8a5513af823d,2024-08-06T16:30:24.547000 -CVE-2024-33980,0,1,4eba04bc64e562fbf0ace4bc2913382276d1832c7c9b0e2ad3ab93144fab8dd8,2024-08-06T16:30:24.547000 -CVE-2024-33981,0,1,e3eb316303f7a79daf960db918660586a68c7c4b30a224b6c6a147302290c8cd,2024-08-06T16:30:24.547000 -CVE-2024-33982,0,1,a5a400641b1905999f31649b77caed7e5463d643fd1a494924a5db164364e9b4,2024-08-06T16:30:24.547000 -CVE-2024-33983,0,1,a83a104a81a24ca7cfe520571c3e6d45ba9414fc29d7ee2d6ed46d045aaab087,2024-08-06T16:30:24.547000 -CVE-2024-33984,0,1,80dbb8d6d0ae9c62edcd055d5bea689800e85b11af62d3cc2fcb35e6df78c974,2024-08-06T16:30:24.547000 -CVE-2024-33985,0,1,bf2f15be93b1dfe5fb7c133507f5743a253ac4bb7b4a8ac7b4eca4e6857d1709,2024-08-06T16:30:24.547000 -CVE-2024-33986,0,1,b40a70fbfc3542817e0fcda7c0df2f0fad439aacf751ab9b76370f519c8aedb3,2024-08-06T16:30:24.547000 -CVE-2024-33987,0,1,442917ed3b76a8b815b40eba92b173487a3bf9fd55468d9157fe5125ed48015f,2024-08-06T16:30:24.547000 -CVE-2024-33988,0,1,baf8dcf2f418a796c4c9249ae00df9c2a14ea7e17323bb1f16d786860d575c72,2024-08-06T16:30:24.547000 -CVE-2024-33989,0,1,179076eb0dd27848282d0b40d13f98582890aaf84191086f322dc0becdb20600,2024-08-06T16:30:24.547000 -CVE-2024-33990,0,1,1ce5ef26ddcbfdd1a66c6664dcb5b9093de430fa35811c02bb876b1af9c3cf69,2024-08-06T16:30:24.547000 -CVE-2024-33991,0,1,e1e285a73ae060087c6b580e1d5356fcac59712e178cc0ae53c6e06da232adc5,2024-08-06T16:30:24.547000 -CVE-2024-33992,0,1,1094f36c0b2c52b12d07fb9e530d7f058ddb66a13df932a0b297760f2f29fa9f,2024-08-06T16:30:24.547000 -CVE-2024-33993,0,1,cff83475a11e398277644959537a2ea849a75ab4593074ae6afe1077f119f004,2024-08-06T16:30:24.547000 -CVE-2024-33994,0,1,cfa1f4ffdf424be2e7316b2ba25a909707d9c2673ea7b674d51f162d464b48aa,2024-08-06T16:30:24.547000 +CVE-2024-33975,0,0,24d9f8b7189c6e049a2d195b8e70f6d865af89b6e07e97dd7c966c273f1ab8ce,2024-08-06T16:30:24.547000 +CVE-2024-33976,0,0,67f5f835747af0987a350b4d42b3bce1f04168a323132a627d10afd7d71c4f21,2024-08-06T16:30:24.547000 +CVE-2024-33977,0,0,405178aa69e8c523d5255a40363518e9f3def64819b4c1b13860e42870541184,2024-08-06T16:30:24.547000 +CVE-2024-33978,0,0,d9fa5afc6af12f1b1775f97e83f5db2f011fa6bd1262b6c0199a8a9aeedc346a,2024-08-06T16:30:24.547000 +CVE-2024-33979,0,0,dfed535c5c088c982cc982c913db9bd03e95887458fb5c6e3b8f8a5513af823d,2024-08-06T16:30:24.547000 +CVE-2024-33980,0,0,4eba04bc64e562fbf0ace4bc2913382276d1832c7c9b0e2ad3ab93144fab8dd8,2024-08-06T16:30:24.547000 +CVE-2024-33981,0,0,e3eb316303f7a79daf960db918660586a68c7c4b30a224b6c6a147302290c8cd,2024-08-06T16:30:24.547000 +CVE-2024-33982,0,0,a5a400641b1905999f31649b77caed7e5463d643fd1a494924a5db164364e9b4,2024-08-06T16:30:24.547000 +CVE-2024-33983,0,0,a83a104a81a24ca7cfe520571c3e6d45ba9414fc29d7ee2d6ed46d045aaab087,2024-08-06T16:30:24.547000 +CVE-2024-33984,0,0,80dbb8d6d0ae9c62edcd055d5bea689800e85b11af62d3cc2fcb35e6df78c974,2024-08-06T16:30:24.547000 +CVE-2024-33985,0,0,bf2f15be93b1dfe5fb7c133507f5743a253ac4bb7b4a8ac7b4eca4e6857d1709,2024-08-06T16:30:24.547000 +CVE-2024-33986,0,0,b40a70fbfc3542817e0fcda7c0df2f0fad439aacf751ab9b76370f519c8aedb3,2024-08-06T16:30:24.547000 +CVE-2024-33987,0,0,442917ed3b76a8b815b40eba92b173487a3bf9fd55468d9157fe5125ed48015f,2024-08-06T16:30:24.547000 +CVE-2024-33988,0,0,baf8dcf2f418a796c4c9249ae00df9c2a14ea7e17323bb1f16d786860d575c72,2024-08-06T16:30:24.547000 +CVE-2024-33989,0,0,179076eb0dd27848282d0b40d13f98582890aaf84191086f322dc0becdb20600,2024-08-06T16:30:24.547000 +CVE-2024-33990,0,0,1ce5ef26ddcbfdd1a66c6664dcb5b9093de430fa35811c02bb876b1af9c3cf69,2024-08-06T16:30:24.547000 +CVE-2024-33991,0,0,e1e285a73ae060087c6b580e1d5356fcac59712e178cc0ae53c6e06da232adc5,2024-08-06T16:30:24.547000 +CVE-2024-33992,0,0,1094f36c0b2c52b12d07fb9e530d7f058ddb66a13df932a0b297760f2f29fa9f,2024-08-06T16:30:24.547000 +CVE-2024-33993,0,0,cff83475a11e398277644959537a2ea849a75ab4593074ae6afe1077f119f004,2024-08-06T16:30:24.547000 +CVE-2024-33994,0,0,cfa1f4ffdf424be2e7316b2ba25a909707d9c2673ea7b674d51f162d464b48aa,2024-08-06T16:30:24.547000 CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000 CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f911,2024-06-03T14:46:24.250000 CVE-2024-33998,0,0,9e3de27d8bf76d6956fcf84fb478824118f2a7a5526fa450d9858736f7cac784,2024-06-03T14:46:24.250000 @@ -252664,25 +252687,25 @@ CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 CVE-2024-34602,0,0,a60646663cb8bf2eacd70cfaa4af39d147258b355ffc1f4917ce8b43a426de00,2024-07-11T14:49:05.190000 CVE-2024-34603,0,0,b2a7efbfdb851e561adba39caae4f17a953dcd69be4ed4e578d4b1a9a528f9aa,2024-07-11T14:48:47.467000 -CVE-2024-34604,0,1,2bcbe1a5fe3f5a094580f71d00c063d5862dbe6e86331c79bccb6b1124d28c85,2024-08-07T15:17:46.717000 -CVE-2024-34605,0,1,5ed2773d66b5f3aff6f7e3dc407c4b8f9562932d0557ce5dc615122a0c2381c4,2024-08-07T15:17:46.717000 -CVE-2024-34606,0,1,a96f71d141f3085c352e16af4fb6fe8ea5ba679f364bf28afd146552a7277081,2024-08-07T15:17:46.717000 -CVE-2024-34607,0,1,50e618db828e50d98d6ba92822c1ab5d969e32957800572321b7a09bcfc9d8db,2024-08-07T15:17:46.717000 -CVE-2024-34608,0,1,1f3bfad0ef613b15fd07a15b7e7e2524190d19d6c0fdc907a9ecd6d6a3d758bf,2024-08-07T15:17:46.717000 -CVE-2024-34609,0,1,fdd88abc4f1aec5669bc0560fac6472ad94e9cdeac1ba870b045ad72beb83e79,2024-08-07T15:17:46.717000 +CVE-2024-34604,0,0,2bcbe1a5fe3f5a094580f71d00c063d5862dbe6e86331c79bccb6b1124d28c85,2024-08-07T15:17:46.717000 +CVE-2024-34605,0,0,5ed2773d66b5f3aff6f7e3dc407c4b8f9562932d0557ce5dc615122a0c2381c4,2024-08-07T15:17:46.717000 +CVE-2024-34606,0,0,a96f71d141f3085c352e16af4fb6fe8ea5ba679f364bf28afd146552a7277081,2024-08-07T15:17:46.717000 +CVE-2024-34607,0,0,50e618db828e50d98d6ba92822c1ab5d969e32957800572321b7a09bcfc9d8db,2024-08-07T15:17:46.717000 +CVE-2024-34608,0,0,1f3bfad0ef613b15fd07a15b7e7e2524190d19d6c0fdc907a9ecd6d6a3d758bf,2024-08-07T15:17:46.717000 +CVE-2024-34609,0,0,fdd88abc4f1aec5669bc0560fac6472ad94e9cdeac1ba870b045ad72beb83e79,2024-08-07T15:17:46.717000 CVE-2024-3461,0,0,562fd4a8dfdf167066f08785e10947fa5d2a47f08e05f03c852e72fd69946c2c,2024-05-14T16:11:39.510000 -CVE-2024-34610,0,1,6a9d013c7821d179d5d05dcecc401db7343827cf1b9538eebeda496cc2099905,2024-08-07T15:17:46.717000 -CVE-2024-34611,0,1,9e4c3574574358c5b24763d76fff94922a4c2031f567885511543697a3e38046,2024-08-07T15:17:46.717000 -CVE-2024-34612,0,1,ad7b18ea13224017a6b0b20e94d970982b471a76cf32a5bd61b14bd2e58b3747,2024-08-07T15:17:46.717000 -CVE-2024-34613,0,1,04aa9efa75bc8a80d9a6f6d82f0c3397ed355ae597b790c4faa9769debbe6bd5,2024-08-07T15:17:46.717000 -CVE-2024-34614,0,1,6b72d5f16bfdaebda4737bc2b6b5a43f959d1c1cbd5ee18feac49e8443fa6086,2024-08-07T15:17:46.717000 -CVE-2024-34615,0,1,cdb22f6ec451fadeb4cbfc7735d3b8dc72a30b33202bcdb3566a33586e88130d,2024-08-07T15:17:46.717000 -CVE-2024-34616,0,1,0e168980827906b139791168cdb8d13eabe1c49a53d6b6881fa85b969f323859,2024-08-07T15:17:46.717000 -CVE-2024-34617,0,1,1b17fbd4300e55f4f7cf707c1811eac9fb84fd00cc316c1cba2d118f5eef2925,2024-08-07T15:17:46.717000 -CVE-2024-34618,0,1,789e9f814f53a796960f23bcbd9869ffcf072413b0e679c750326ca6f299963e,2024-08-07T15:17:46.717000 -CVE-2024-34619,0,1,5d794e1e7c34dc47b19d8aa704f1a95eda642410d3c7905ba433c2c203125095,2024-08-07T15:17:46.717000 +CVE-2024-34610,0,0,6a9d013c7821d179d5d05dcecc401db7343827cf1b9538eebeda496cc2099905,2024-08-07T15:17:46.717000 +CVE-2024-34611,0,0,9e4c3574574358c5b24763d76fff94922a4c2031f567885511543697a3e38046,2024-08-07T15:17:46.717000 +CVE-2024-34612,0,0,ad7b18ea13224017a6b0b20e94d970982b471a76cf32a5bd61b14bd2e58b3747,2024-08-07T15:17:46.717000 +CVE-2024-34613,0,0,04aa9efa75bc8a80d9a6f6d82f0c3397ed355ae597b790c4faa9769debbe6bd5,2024-08-07T15:17:46.717000 +CVE-2024-34614,0,0,6b72d5f16bfdaebda4737bc2b6b5a43f959d1c1cbd5ee18feac49e8443fa6086,2024-08-07T15:17:46.717000 +CVE-2024-34615,0,0,cdb22f6ec451fadeb4cbfc7735d3b8dc72a30b33202bcdb3566a33586e88130d,2024-08-07T15:17:46.717000 +CVE-2024-34616,0,0,0e168980827906b139791168cdb8d13eabe1c49a53d6b6881fa85b969f323859,2024-08-07T15:17:46.717000 +CVE-2024-34617,0,0,1b17fbd4300e55f4f7cf707c1811eac9fb84fd00cc316c1cba2d118f5eef2925,2024-08-07T15:17:46.717000 +CVE-2024-34618,0,0,789e9f814f53a796960f23bcbd9869ffcf072413b0e679c750326ca6f299963e,2024-08-07T15:17:46.717000 +CVE-2024-34619,0,0,5d794e1e7c34dc47b19d8aa704f1a95eda642410d3c7905ba433c2c203125095,2024-08-07T15:17:46.717000 CVE-2024-3462,0,0,54779d92a3c6d70fd24721dad0ad60ea3e87e07e6060c4f8a8e7678e5dd7fd43,2024-05-14T16:11:39.510000 -CVE-2024-34620,0,1,3dbd9847889a5beb7b567cda9acaa3269d159015ea223a905c574b66660333e1,2024-08-07T15:17:46.717000 +CVE-2024-34620,0,0,3dbd9847889a5beb7b567cda9acaa3269d159015ea223a905c574b66660333e1,2024-08-07T15:17:46.717000 CVE-2024-34621,0,0,fbb4f55b8bb52c900dd8b6fb5e30a72cb1ea07a01b1c400b8d7287789fe61e97,2024-08-09T20:43:21.560000 CVE-2024-34622,0,0,aeda50f8bab0ac7ef960dd7444278eb4fda7645ea46e11099531591011c5f504,2024-08-09T20:15:32.807000 CVE-2024-34623,0,0,19373210134a4cd760b6b98a0812636c3cbab05334977d529167d5f59ba84019,2024-08-09T20:28:41.320000 @@ -252699,7 +252722,7 @@ CVE-2024-34632,0,0,bf1da971d9c08dbfc3ba6b9b0305e27336a8eced8062af973a4612b88c383 CVE-2024-34633,0,0,dcc919d4fe3cd88a5fcb40687da081e03a0a9de314e12214fe0ef228c52e1a41,2024-08-09T21:17:19.217000 CVE-2024-34634,0,0,ca7a7dede48188d5d254d269b40f8d801c38580350c32ea8a5414c109ee76db9,2024-08-09T21:17:55.090000 CVE-2024-34635,0,0,f315481fa1588ad6ec51d6f8cc1b6dc04d19bc1ee3f7f3e279e9f419b1b04cd7,2024-08-09T21:18:43.303000 -CVE-2024-34636,0,1,12a9dce84f7a16975e916eab6b83a39752b1b5e387c65698edba42a30c7632cd,2024-08-07T15:17:46.717000 +CVE-2024-34636,0,0,12a9dce84f7a16975e916eab6b83a39752b1b5e387c65698edba42a30c7632cd,2024-08-07T15:17:46.717000 CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000 CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9c6,2024-05-17T02:39:57.623000 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 @@ -252781,7 +252804,7 @@ CVE-2024-34773,0,0,100b1cb449b7ae251f86bd995ac4446f704b2d5bcbff0a59ab0bc97995491 CVE-2024-34777,0,0,47369db5c522c34e9489779523e2c10406821ae54d821b2c269278d042fde193,2024-06-21T15:58:51.410000 CVE-2024-3478,0,0,d6058a0e6db67f9fedb470e62fc4a04776cf84b327b4bd61639e707b408d963f,2024-05-02T13:27:25.103000 CVE-2024-34786,0,0,7e8cb80185704202113f9da64eeb79cd413e4b998d966b2b2f4137b8800de467,2024-07-09T18:19:14.047000 -CVE-2024-34788,0,1,16a68c50427feddf54e6edc7199e1d59140fcfc829fde0ab2b1c610738185379,2024-08-07T15:17:46.717000 +CVE-2024-34788,0,0,16a68c50427feddf54e6edc7199e1d59140fcfc829fde0ab2b1c610738185379,2024-08-07T15:17:46.717000 CVE-2024-34789,0,0,4f72636ebbc4b0b39015d14b70eb26533195de09d45d80202a2d9d74dbf95795,2024-06-03T14:46:24.250000 CVE-2024-3479,0,0,2087dca9a48cf75ca53b3d034f436013bdbf676fd8cbe9ff75bcea8a2c85c808,2024-05-03T15:32:19.637000 CVE-2024-34790,0,0,bb517ba71512ecca1961733ab53cba498603a9fe6586ef7db5965f9b7f26b4f0,2024-06-03T14:46:24.250000 @@ -252936,14 +252959,14 @@ CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6 CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000 CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794d8e,2024-05-31T19:14:47.793000 CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000 -CVE-2024-35143,0,1,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000 +CVE-2024-35143,0,0,157edc929067584960228800256bf7e4e656c8fe568bfebf09213a67a4e1ab8c,2024-08-05T12:41:45.957000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000 CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 CVE-2024-35155,0,0,371571e1aae62a09e601d6099b5578266a4a707997394118a0b1e39997d5568b,2024-08-01T17:56:03.997000 CVE-2024-35156,0,0,7c4915a6e4fe8b0271ff6d9725c9fe229558124031a1900b31f29119291d2b8c,2024-07-01T12:37:24.220000 CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000 -CVE-2024-35161,0,0,5b1f2647531a5d5b0f838168c4e1e46772cc2bf936ac72086e3c013a91970dfd,2024-08-01T13:52:33.223000 +CVE-2024-35161,0,1,1bc8d21dda3044e5ae73848911d8dfa9cb27966a87d6de7869a82e1a947adbec,2024-08-12T13:39:50.477000 CVE-2024-35162,0,0,898115932dab71d396aafa3d3e8a79f10b6e8ca121500758707a59e848faab9f,2024-05-22T12:46:53.887000 CVE-2024-35165,0,0,a5a2ced0aefc202025ce7b223ffafe3ffc4109906dfd07a5a8a0577e3f72ac5b,2024-05-14T16:11:39.510000 CVE-2024-35166,0,0,288535809aded0d0429463b3203e908304fa856ed04133053a9493366e89b509,2024-05-14T16:11:39.510000 @@ -253047,7 +253070,7 @@ CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71 CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000 CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000 CVE-2024-35292,0,0,e3b3d736ef0c9425797f6a5a9790b2cb56e0a53578005725786d8a247ceee1f2,2024-06-11T13:54:12.057000 -CVE-2024-35296,0,0,9f109421e3a1d22d15127e4e36ed3bcdfea11ad5663210c756404790dc37bad7,2024-07-26T12:38:41.683000 +CVE-2024-35296,0,1,82c7767da6fa670c8aa66295178569bca6e87e99e7267708f981755194c6c0f5,2024-08-12T13:55:37.307000 CVE-2024-35297,0,0,a17fd925b730fd9803b93156d1a4f0f1baa604bce402fb65f95c09819b0a7763,2024-05-28T12:39:28.377000 CVE-2024-35298,0,0,767802677800ceed2390ec4b021eb4a1bb445bf1aba3154a6ba4d4e3eb13ec79,2024-07-03T02:01:32.613000 CVE-2024-35299,0,0,243cc758e93ac683f2ab1068e78446f59938832d5b992bf674806bf0216e461c,2024-05-16T13:03:05.353000 @@ -253472,7 +253495,7 @@ CVE-2024-35890,0,0,c9e041330da31f6b1d7b23542034dc0e37c90e764366e19a0a1a3d2e27288 CVE-2024-35891,0,0,020345e2d6b07ed9ebb9279a6d9a2dea40c65eb51e6d3fc0c5cd350efe2fc0df,2024-05-20T13:00:04.957000 CVE-2024-35892,0,0,f5dcb897850b4e8e41108cf32bfe1cea3b258cecc6972cb2630293f619e933f1,2024-05-20T13:00:04.957000 CVE-2024-35893,0,0,e6a35e25225cefb5ffa6b77cac4a079ee713f0238e7e35e74660e66bb0ecc8c4,2024-06-27T12:15:25.943000 -CVE-2024-35894,0,0,574b8467c9a29a14b95308bf4aba64e71a6c5b9d846f621f127a5767ed2a75a4,2024-05-20T13:00:04.957000 +CVE-2024-35894,0,1,1790b8bdc53af1b32b593033531b9c956bd1f4a63d07b8a3998381f55832751a,2024-08-12T13:38:21.393000 CVE-2024-35895,0,0,04b8c84c878a9450c1f88c15bd12e0ef9e879448b59cab521eb060ea69ee20a0,2024-06-25T22:15:32.367000 CVE-2024-35896,0,0,38740fa9e0e28c1998375bca10b45aa3bea5349d16d5bb779072be0a08a5ef50,2024-06-25T22:15:32.433000 CVE-2024-35897,0,0,93dd335f3c661b184a9126ceda6682793e22f6e45c2ebebcb998960eb0c68b3e,2024-06-25T22:15:32.503000 @@ -253626,6 +253649,8 @@ CVE-2024-36030,0,0,11bca5a7a0f794a9728565db8fe3bf57d57b1cd49615598f4f465f5257dd1 CVE-2024-36031,0,0,2975546e733dd5cf7c9429c6f90bb5d1e17451572ff45240b1c22396c4a132e4,2024-07-15T07:15:04.830000 CVE-2024-36032,0,0,2109bf212013c0ba30d278bc6b666931e282e8ca3b018462b2d195519f5dd498,2024-07-05T08:15:02.620000 CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d43a,2024-07-05T08:15:02.720000 +CVE-2024-36034,1,1,aeaf49d4aef97b2aa0a71da058a8d8b8bc517b0db89fb9b737f3b6b4b12764c4,2024-08-12T13:41:36.517000 +CVE-2024-36035,1,1,850bb74e9d767634d195d572b4b29e069e815c52f97cc8bb556a76aeed718ede,2024-08-12T13:41:36.517000 CVE-2024-36036,0,0,7da0ef0412625002a493959e0f4b9d5a2d61be8a7aa9a2a45b491bb215f046f7,2024-05-28T12:39:28.377000 CVE-2024-36037,0,0,b69974bc3633092c95e0c07f5aa24d13ab328cfb54a9948a0d1d9e8d060f0b0a,2024-07-03T02:02:41.210000 CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000 @@ -253690,9 +253715,9 @@ CVE-2024-36127,0,0,f67ed99c9205750d87408264109b0b2da12607ef1d07ca1d5849393d1955e CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5007,2024-06-03T19:23:17.807000 CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000 CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000 -CVE-2024-36130,0,1,f09a161ea53fc96c2b38ec7992f77a6528b558ec6113ebb2184433aac9e1e74d,2024-08-08T21:35:14.980000 -CVE-2024-36131,0,1,0feecc88add5cad70b7615e1c83cdaa42ec2ea82f6faabdaf16c682123fc2c47,2024-08-07T15:17:46.717000 -CVE-2024-36132,0,1,570a1090b30e016a55247c633c9c00668832d8daa4a211e5d43a167a0879645b,2024-08-07T15:17:46.717000 +CVE-2024-36130,0,0,f09a161ea53fc96c2b38ec7992f77a6528b558ec6113ebb2184433aac9e1e74d,2024-08-08T21:35:14.980000 +CVE-2024-36131,0,0,0feecc88add5cad70b7615e1c83cdaa42ec2ea82f6faabdaf16c682123fc2c47,2024-08-07T15:17:46.717000 +CVE-2024-36132,0,0,570a1090b30e016a55247c633c9c00668832d8daa4a211e5d43a167a0879645b,2024-08-07T15:17:46.717000 CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000 CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000 CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000 @@ -253815,7 +253840,7 @@ CVE-2024-36264,0,0,14c280aba5df11c6b2ff8e262101089437d0333d307f52ff751b574a69563 CVE-2024-36265,0,0,3c8ae8461757f224b0e43678d6a3475afd39b129c52679abb832e768cb65918d,2024-08-02T04:16:59.920000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 -CVE-2024-36268,0,1,dff0467d290592509ee25f10c7bba0154491650d4cb39d7b286134a8cb057fcc,2024-08-02T12:59:43.990000 +CVE-2024-36268,0,0,dff0467d290592509ee25f10c7bba0154491650d4cb39d7b286134a8cb057fcc,2024-08-02T12:59:43.990000 CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000 CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000 @@ -253903,7 +253928,7 @@ CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000 CVE-2024-36422,0,0,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000 CVE-2024-36423,0,0,8fccf5fe0a9c314803742689debe16a3c95c7af9b7d5f30b496e24f061127873,2024-07-02T12:09:16.907000 -CVE-2024-36424,0,1,e8917c69f306f3df8b16fb33537e48c5c1bc5a099efbd97c3a235e667fc6a32c,2024-08-06T16:30:24.547000 +CVE-2024-36424,0,0,e8917c69f306f3df8b16fb33537e48c5c1bc5a099efbd97c3a235e667fc6a32c,2024-08-06T16:30:24.547000 CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000 CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000 @@ -253914,7 +253939,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 -CVE-2024-36448,0,1,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000 +CVE-2024-36448,0,0,1175cc623301466e8a019bc6e0833d0f29d9f1c79b10495f6dc5ff5c39383d2f,2024-08-05T17:15:41.557000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 CVE-2024-36450,0,0,700527b7e7e1ebac8a4794e042f6b829b1a1f942eb0939907744fde9a0923a2e,2024-07-31T14:47:05.423000 CVE-2024-36451,0,0,0282b5798612593892f8b22f51a38ce8164272f8754ea7af1c514e9b953ab154,2024-07-11T15:05:47.857000 @@ -253927,6 +253952,9 @@ CVE-2024-36457,0,0,72760e3039fa35b5fe26ddad9fdef8608f653e7f7685e05328a58a9de033d CVE-2024-36458,0,0,8cc25938d2d5cd1d323ce70bc7a8d0cc38a394cde01025dc622780ae5428e886,2024-07-16T13:43:58.773000 CVE-2024-36459,0,0,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 CVE-2024-3646,0,0,09fb4454fc243991c509642fa1713408149b474f66cbbd7885e81a3ea360afe7,2024-04-19T16:19:49.043000 +CVE-2024-36460,1,1,b53c4b47043ed595bbc47f83562ba8f9e2314bd5ee4a57e4c7c05588dd12fb54,2024-08-12T13:41:36.517000 +CVE-2024-36461,1,1,0a02b5d50758534c85e4c3cd866b08fed65e4dce8e43c55d0801b30e8890c0de,2024-08-12T13:41:36.517000 +CVE-2024-36462,1,1,d756883d8f998a9f34f1d9962690ab91de260882110c4ec06bbdbb0deafdb127,2024-08-12T13:41:36.517000 CVE-2024-3647,0,0,e692fc1fd5d3cf9f103fd75a1aca6bf5cd926bde53ed2fb4c9f367b74741ee51,2024-05-02T18:00:37.360000 CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a55b,2024-05-31T14:15:10.607000 CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000 @@ -253954,13 +253982,14 @@ CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000 CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 +CVE-2024-36518,1,1,9e255d90cbaa951a4f56e02878fc00109d62b1bfb91ac63b84ac72351707e336,2024-08-12T13:41:36.517000 CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000 CVE-2024-36522,0,0,86674e42114231d1026f4ff35fe6fe6affeea594b7c00b1a81ef4e17dc0fe83d,2024-08-01T13:52:58.033000 CVE-2024-36523,0,0,3016893dc57dcd62edd08208dde4ce2567742ed11633d9956e63ba6b508801fd,2024-06-13T18:36:09.010000 CVE-2024-36526,0,0,1ddb30b565e6d7a152e00264224393d020c0bb948b7f968c326e2d1f8170cd41,2024-08-01T13:52:58.227000 CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000 CVE-2024-36528,0,0,2720657851e73513f2a766ff74bcbf76f8ccd5ffff5f964570f2d3734bd169d5,2024-06-10T18:06:22.600000 -CVE-2024-3653,0,0,2ce001c8a2558fa4f76ef87c21e8ceeb7eaae4cf2cb26c9cd78a019c19336759,2024-07-09T18:19:14.047000 +CVE-2024-3653,0,1,ebd69680b1122e6ac45d38522017549d10dde629dd149529cb0348d7b4220293,2024-08-12T13:38:27.570000 CVE-2024-36531,0,0,a4158d6a8860f8c9c37cc090a05d54c5f8fca61c7fff205691822d02cbdf6215,2024-08-01T13:52:59.007000 CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000 CVE-2024-36533,0,0,6d6a58ccbd9862b12d84a535bbe7b9936ca5202878de14518d14e5cbc520ef59,2024-08-01T13:52:59.810000 @@ -253997,7 +254026,7 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000 CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000 CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000 -CVE-2024-3659,0,1,33394772aa641fb07f0510b51d942dea1a540d5830d40dc17b7f22af9b7d0a43,2024-08-08T18:55:28.493000 +CVE-2024-3659,0,0,33394772aa641fb07f0510b51d942dea1a540d5830d40dc17b7f22af9b7d0a43,2024-08-08T18:55:28.493000 CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000 CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000 CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000 @@ -254237,6 +254266,7 @@ CVE-2024-37018,0,0,5c84c294f6633e4746e32fd18cb412c8579660145e88eac3a32eeb7275210 CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000 CVE-2024-37021,0,0,df42b273589de5447bead7df7667049e2658c880af6df99f8ec35df9bab3713a,2024-06-24T19:26:47.037000 CVE-2024-37022,0,0,751bf85c3a2469952ed35738f159026027aa22116052dd4c21287b6f73e28344,2024-06-13T18:35:19.777000 +CVE-2024-37023,1,1,8579aba31408a330bccfa48ab7e07c2d38c8a19085f70812a030aa4682b5f50b,2024-08-12T13:41:36.517000 CVE-2024-37026,0,0,72a4b17689cbdac04fb86cce78128e997cb4a2e097881aab9fb79c35d7ec4f49,2024-06-24T19:26:47.037000 CVE-2024-37029,0,0,68da28cee4247ca52721a8bed64c6fa315228d3c1768712f52d1663deb48f802,2024-06-13T18:35:19.777000 CVE-2024-3703,0,0,bd96f9d277c687f2c8df474724f359223698fb8a762e1288e006520ebff94d49,2024-05-03T12:48:41.067000 @@ -254426,7 +254456,8 @@ CVE-2024-3728,0,0,49e6a5f26d01c7fceec7c4bf5478901bb5f23d6a3c9a4cf291a1c58fdb13c1 CVE-2024-37280,0,0,4bf0b68a6d051ee4d807c8e0d879d350a787ee8342452cb57dcf78535379f45a,2024-06-13T18:35:19.777000 CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e7864801ae,2024-07-31T12:57:02.300000 CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000 -CVE-2024-37286,0,1,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14628,2024-08-05T12:41:45.957000 +CVE-2024-37283,1,1,43778d29654f3a784f1d881c1b776f9f47eb39a9a44700b37d8fb12a22882627,2024-08-12T13:41:36.517000 +CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14628,2024-08-05T12:41:45.957000 CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,efa095b0cfa3ac59ab9798514bc41970933da504bf684c09bb20230e55ad7e3a,2024-06-13T18:36:09.013000 @@ -254448,7 +254479,7 @@ CVE-2024-37309,0,0,8b77a8abce2581f8670d973fc05d76a08446b9e83f8b1259f30461904bc28 CVE-2024-3731,0,0,ef8eca77ff9380ae76e470c90fb3d29a9ba51986895ffc0d9d864ff0b2261547,2024-04-19T13:10:25.637000 CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601463,2024-07-11T13:05:54.930000 CVE-2024-37312,0,0,c9951de02441eaa79d1cb1dd04f0cb479ff9f95a9feb89bd2a12c3935f476481,2024-06-17T12:42:04.623000 -CVE-2024-37313,0,1,aa0f6b44a59e1e1c752c1aa0bfc59db8945bb5237a8f4c76a445961f28196802,2024-06-17T12:42:04.623000 +CVE-2024-37313,0,0,aa0f6b44a59e1e1c752c1aa0bfc59db8945bb5237a8f4c76a445961f28196802,2024-06-17T12:42:04.623000 CVE-2024-37314,0,0,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefcf59,2024-06-17T12:42:04.623000 CVE-2024-37315,0,0,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000 CVE-2024-37316,0,0,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000 @@ -254499,7 +254530,7 @@ CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000 -CVE-2024-37382,0,1,035f21f2de03c0ca13c52a66e184304f7e21de3f9394d8e94115f7404ad6cfbf,2024-08-08T20:35:08.353000 +CVE-2024-37382,0,0,035f21f2de03c0ca13c52a66e184304f7e21de3f9394d8e94115f7404ad6cfbf,2024-08-08T20:35:08.353000 CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000 @@ -254511,7 +254542,7 @@ CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 -CVE-2024-37403,0,1,c394e6735010bac617e7791eb1e1219144cc31f9084fc7409fabae3424cc0cea,2024-08-07T15:17:46.717000 +CVE-2024-37403,0,0,c394e6735010bac617e7791eb1e1219144cc31f9084fc7409fabae3424cc0cea,2024-08-07T15:17:46.717000 CVE-2024-37405,0,0,a7f42023569aa18cbb4863def372451bd6a310533c03fc36f82684a5a0e2908a,2024-08-01T13:53:37.273000 CVE-2024-37407,0,0,b2071e78ac73cfcd8ee3f67daccfb5fa834666925d4b4867e66acc10a01216e8,2024-07-17T20:16:52.400000 CVE-2024-37408,0,0,eb778f004cf5924dfd0d49ef3a547f8fc261b5b94a8ccc282bf44b0568e6414d,2024-08-02T04:17:16.287000 @@ -254725,6 +254756,7 @@ CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c CVE-2024-37820,0,0,fa0bbe561377b7b439a8d7f261288bdc816d9d647e91a5782129fd4223c1afcd,2024-07-15T22:15:02.850000 CVE-2024-37821,0,0,dad227ff1e39e1e08a617033ca30de21cc87f5062f829537e300bad0e33ab0a8,2024-07-03T02:04:48.313000 CVE-2024-37825,0,0,a074512a3706a5e0b66f32acac0d9da7bd1ebc518866e75f394400d27da107ec,2024-06-24T19:26:47.037000 +CVE-2024-37826,1,1,21b5dcb02db9c195ab30259b2587dd38da1527a4aca39309b8bcb44ca1f6d0d1,2024-08-12T13:41:36.517000 CVE-2024-37828,0,0,653e42606d609f163a3b5d705ea81e99ecfb2b567f39d5f12626fb6af9b936ba,2024-06-20T12:44:22.977000 CVE-2024-37829,0,0,1e83f5827db2aebd4e043417419d588d621c3e555f2d66c999e782ce41670452,2024-07-11T15:05:54.680000 CVE-2024-3783,0,0,a6e56ec812c297facd52c1a6c05ed03a057924506051c9c8d60002ff023e1b00,2024-04-15T19:12:25.887000 @@ -254934,16 +254966,19 @@ CVE-2024-3815,0,0,55e2d42c0e61accee69ffa342efcde0fddef3a4ea430c0440620925be3cd14 CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 CVE-2024-3816,0,0,75ffa648a8fdfd5e75d27a5c1f7d2535fe4ef8b6da1bbd82db22ae48c443785a,2024-08-01T13:56:42.403000 CVE-2024-38164,0,0,61f090a580db18da87c17a5aaaecf0d4c74a1627bb07a737232d22421913c30c,2024-08-02T04:17:24.557000 -CVE-2024-38166,0,1,1d49d6dcedae06130dfc831be4e1a005c37870560288c04b8ba3215477c775b3,2024-08-08T10:15:06.427000 +CVE-2024-38166,0,1,0e9721d9a4d811d84f96369c58a312ace3db65e60ff54f63dbebeefa146420fe,2024-08-12T13:38:23.440000 CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000 CVE-2024-38176,0,0,9b2b21b2ffaaf0c79ea2462db71750a351bbe8e9b4ac053f46219745b5043ccf,2024-08-02T04:17:24.717000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 CVE-2024-38182,0,0,b4d26c4f4cbe1c2272cffdb42dee316497d9ebef820b6332d9e510a850c3591f,2024-08-02T04:17:24.853000 CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000 CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000 +CVE-2024-38200,1,1,30f61ef0f341771cb3da7c017f647bc0d7ca72b8b83eb77e95bb1ef00a376917,2024-08-12T13:41:36.517000 CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000 -CVE-2024-38206,0,1,2d4ad427a2c30453a512c9ff8428e7edc468bb5db066d042d07964aef2ab47d3,2024-08-08T10:15:06.697000 +CVE-2024-38206,0,1,4045852672f6fec457d2c883ace3e7a9d3deeb11ec1aa1be036d3f61152bb1e1,2024-08-12T13:38:23.820000 CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 +CVE-2024-38218,1,1,3a49c7dc6bb0374d11da99e5a55b6986d36c1cf5da3a51c54b24361dc5409e9c,2024-08-12T13:41:36.517000 +CVE-2024-38219,1,1,2fca9f35b77d67770864b68108bd122ee00786d86b3d46defa01ed91881911bc,2024-08-12T13:41:36.517000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000 @@ -255395,6 +255430,7 @@ CVE-2024-38983,0,0,b4007717ba4ecdcb9f705c2dcea6a2ebbf6e393e28ab95db12566748e8954 CVE-2024-38984,0,0,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000 CVE-2024-38986,0,0,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000 CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000 +CVE-2024-38989,1,1,d752938c80deda5b171af5c6086cf96369e2425c421824e4ddf9e14cf0940e2a,2024-08-12T13:41:36.517000 CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 CVE-2024-38992,0,0,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000 @@ -255484,7 +255520,7 @@ CVE-2024-39207,0,0,036923690cb1c7219bdbc37921ba10b53c63e774f7f4be50452133314f36f CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b1dc,2024-08-01T13:55:46.647000 CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000 -CVE-2024-39210,0,1,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000 +CVE-2024-39210,0,0,9e92b2a764e37e65ff70cacec2f99d4341944da2c135d4b7c23af986b18ec326,2024-07-09T16:22:51.927000 CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed468b9,2024-07-05T12:55:51.367000 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 @@ -255511,7 +255547,7 @@ CVE-2024-39274,0,0,e6293a55fc2e07d4badaf0b6ab097c48e8ef50320910d51d55d3f365db2ff CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 CVE-2024-39277,0,0,da44e9f6b14f33e5d22339f98a1af8621d431ecd39b0e0bcdb259c56dded4baa,2024-06-24T19:17:48.380000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 -CVE-2024-39287,0,1,3866b98246a17928edc319695455d791c225269ac0799e186aed4a8cab730e7c,2024-08-08T18:55:19.180000 +CVE-2024-39287,0,0,3866b98246a17928edc319695455d791c225269ac0799e186aed4a8cab730e7c,2024-08-08T18:55:19.180000 CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000 CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000 CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32cc4,2024-07-15T07:15:14.940000 @@ -255550,6 +255586,7 @@ CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f3 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 +CVE-2024-39338,1,1,0fe708e1f62ccbc7e7d2b1ddd902371e291019a5b576fae9ead499bc904e422e,2024-08-12T13:41:36.517000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-39340,0,0,5ebdab5b5b68a92db4ff353d7a08162224794f82acef11835fd7731e9f604ef2,2024-08-01T13:55:49.473000 CVE-2024-39345,0,0,a7fe401efcbb2b3728b6e10777ee0a9c04a224d785c5c0839b1d13cfea4ecde8,2024-08-01T13:55:50.247000 @@ -255564,7 +255601,7 @@ CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882b CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000 -CVE-2024-39371,0,1,7981822be390c958958f4d55af98e1abccdb49b9583dac35d34a8951ee1b84a4,2024-06-25T18:50:42.040000 +CVE-2024-39371,0,0,7981822be390c958958f4d55af98e1abccdb49b9583dac35d34a8951ee1b84a4,2024-06-25T18:50:42.040000 CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa8b9,2024-06-27T17:11:52.390000 CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 @@ -255590,15 +255627,15 @@ CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166 CVE-2024-39460,0,0,4f78962312c460642ba8951e77b013301d272c348dd713c542bd0b2b628a69cf,2024-06-27T12:47:19.847000 CVE-2024-39461,0,0,cecb9bb9a4945e2f0e4a10c8862685b90a08a104cc3bac781d0de62df1e3d355,2024-06-25T18:50:42.040000 CVE-2024-39462,0,0,d6fa49df9f42ed202e5a3cc2f250dce01e83d58a2dd9514f13116e83ffa785aa,2024-07-03T02:05:49.283000 -CVE-2024-39463,0,1,47b7e4ed4ce8ef7a787fad9d1bf8e6ce01a7584854c849f2102915a88618997c,2024-06-25T18:50:42.040000 -CVE-2024-39464,0,1,d8d08122e3c7822c6e2c81bade6843bb6f6c731126a109b202da2c920c199b08,2024-06-25T18:50:42.040000 -CVE-2024-39465,0,1,bc634101bd61fc8fe5cdea36fba30094de5e1420c5c522aed6e025caf745d09e,2024-06-25T18:50:42.040000 -CVE-2024-39466,0,1,be958e7a9a2b27b0fb9b2c0d9a71181e3eb90c511ad274e3afe48c007e696285,2024-06-25T18:50:42.040000 +CVE-2024-39463,0,0,47b7e4ed4ce8ef7a787fad9d1bf8e6ce01a7584854c849f2102915a88618997c,2024-06-25T18:50:42.040000 +CVE-2024-39464,0,0,d8d08122e3c7822c6e2c81bade6843bb6f6c731126a109b202da2c920c199b08,2024-06-25T18:50:42.040000 +CVE-2024-39465,0,0,bc634101bd61fc8fe5cdea36fba30094de5e1420c5c522aed6e025caf745d09e,2024-06-25T18:50:42.040000 +CVE-2024-39466,0,0,be958e7a9a2b27b0fb9b2c0d9a71181e3eb90c511ad274e3afe48c007e696285,2024-06-25T18:50:42.040000 CVE-2024-39467,0,0,24b2e918bb6f2bd61687825dd13d0cc0cecac046d19a687da10524a29da67531,2024-06-25T18:50:42.040000 CVE-2024-39468,0,0,ae6a017e6c367f752286f52d1aab45d1166b4dcdd4ca3930857e995f1f6e7677,2024-07-05T08:15:03.410000 CVE-2024-39469,0,0,4f76bc2884fab99f2e647535e4f5ff6741622700979dba4d1d6ae85a7edb0f27,2024-07-05T08:15:03.467000 CVE-2024-3947,0,0,5ac97013084fcc39672b6ea95b043d5a77dd21abc36167b8c6988b355b186d2c,2024-05-30T13:15:41.297000 -CVE-2024-39470,0,1,a5037914436ce9b835dac83661b215f18c9ba9ca80f3efeea162f571d060a96a,2024-06-25T18:50:42.040000 +CVE-2024-39470,0,0,a5037914436ce9b835dac83661b215f18c9ba9ca80f3efeea162f571d060a96a,2024-06-25T18:50:42.040000 CVE-2024-39471,0,0,89f000b418cb95dfd2a08e65629c84af8b993dbc826d3e812ee14f26f967887b,2024-06-25T18:50:42.040000 CVE-2024-39472,0,0,ea2b370668b8ec935c1b38a14394d02dc22fede70a57b164a3c7e54b828ad2fb,2024-07-08T17:12:34.903000 CVE-2024-39473,0,0,b24af8dffbe76f90c2262850990b3e2af991f249a99e7e85721ef205ffeb0fd3,2024-07-08T17:12:06.610000 @@ -255683,7 +255720,7 @@ CVE-2024-39554,0,0,607b6e2d09565242cea8dabcf216d7050a2b93324b4645878cad8b169c28c CVE-2024-39555,0,0,2f4320b551c6e22d863307bba36cd5d725d7060ed4b026ce642dd6f86bb7e040,2024-07-11T13:05:54.930000 CVE-2024-39556,0,0,647fdc524ccc7990194a12b5e61500593bd5f260b420aa3369c383e0ab67df27,2024-07-11T13:05:54.930000 CVE-2024-39557,0,0,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863959,2024-07-11T13:05:54.930000 -CVE-2024-39558,0,0,2c8234bb1e56f02b1dd69b6d7d1c452c66a728f5c6ba35ca2896bb6d30eada6e,2024-07-11T13:05:54.930000 +CVE-2024-39558,0,1,f90cadeb1900fca56f5888109bfbb2a2d09e5b97ab830e54de2a3e13ed068c80,2024-08-12T13:38:24.610000 CVE-2024-39559,0,0,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000 CVE-2024-3956,0,0,a3cb09bf1f28d977327946dc32f9ea686f27cbe51075fc0453b6840e64eb9d3b,2024-05-14T16:11:39.510000 CVE-2024-39560,0,0,b4ed92932e2d04f6c32524ca2b7ed5834cd6ea452116fcc1c65eefbeae3fbc2c,2024-07-11T17:15:16.867000 @@ -255805,13 +255842,15 @@ CVE-2024-39740,0,0,03acc910317a10fe912464b7efeeb485740a2ca83e55d3c05a65c84915618 CVE-2024-39741,0,0,829c9dc10ec61ebda2ab0b49cc6a9c5e79410be7630ee14de90c81590961617f,2024-07-16T14:03:33.243000 CVE-2024-39742,0,0,d2c383b6f83715e80ad86c53a5952b482038888e11ae903f4721eb34788c653c,2024-08-07T16:08:52.997000 CVE-2024-39743,0,0,9176c5c22c144cd819fc7f93cb765aeb69d23c83aacdd30e057197adb10cc129,2024-08-07T16:10:15.813000 -CVE-2024-39751,0,1,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 +CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 CVE-2024-39777,0,0,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170daf18,2024-08-01T16:45:25.400000 CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 +CVE-2024-39791,1,1,3cd2b22a57bb5113f96fc3bdb8edc51529b43d18ef6eec8be40b5e89ac2f59c4,2024-08-12T13:41:36.517000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 +CVE-2024-39815,1,1,73549bac4d3dafa1435258cd85ed01a04d37bbc9e2dd41be7e07cdfb0e91eb39,2024-08-12T13:41:36.517000 CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000 CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000 CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000 @@ -255861,7 +255900,7 @@ CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb83 CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0484,2024-07-16T14:15:04.380000 CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000 -CVE-2024-39891,0,1,ce65af2cc2ab9f5337749d509721b17f14cb456e8c1b3062d4901ad84093db6b,2024-07-24T14:38:43.270000 +CVE-2024-39891,0,0,ce65af2cc2ab9f5337749d509721b17f14cb456e8c1b3062d4901ad84093db6b,2024-07-24T14:38:43.270000 CVE-2024-39894,0,0,8d9862066d21f5982fd2fdf927182a7ca3492baae4149413d35a0dd383269b89,2024-07-28T21:15:10.380000 CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000 @@ -255926,15 +255965,15 @@ CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4 CVE-2024-4005,0,0,afa421f5bee664ced5c552a131b98509d73342abcbf2673bca51baf98e6007c4,2024-07-29T16:35:52.363000 CVE-2024-40051,0,0,2390648c59364020ab77e3a455e0a8719e496630dfc49c594a9ca2016b775f44,2024-07-24T12:55:13.223000 CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000 -CVE-2024-40060,0,1,e91dca1b5fd42400d0147301d3d9e1f8ee5497fc83e98b45927102180d84508f,2024-07-25T17:49:00.047000 +CVE-2024-40060,0,0,e91dca1b5fd42400d0147301d3d9e1f8ee5497fc83e98b45927102180d84508f,2024-07-25T17:49:00.047000 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000 CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000 -CVE-2024-40096,0,1,d8754528addbe80fbf9f4d9648ed7183bc82944e53f9acdf3e8fc0aa5af1d9bc,2024-08-05T12:41:45.957000 +CVE-2024-40096,0,0,d8754528addbe80fbf9f4d9648ed7183bc82944e53f9acdf3e8fc0aa5af1d9bc,2024-08-05T12:41:45.957000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 -CVE-2024-40101,0,1,fa05a141dcc36735ee72bbd0c3b7b1a769814f7631a0be292d4f64087437d8d6,2024-08-06T16:30:24.547000 +CVE-2024-40101,0,0,fa05a141dcc36735ee72bbd0c3b7b1a769814f7631a0be292d4f64087437d8d6,2024-08-06T16:30:24.547000 CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000 CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000 CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000 @@ -256002,6 +256041,21 @@ CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 CVE-2024-40464,0,0,e0961ca0a3aa848ce7061cc7ba1fa2af403b350ed8107067aa6b807e1e6fd113,2024-08-06T18:35:03.237000 CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000 +CVE-2024-40472,1,1,c3f1304f7f6a6f624b7992076e6d1fe56be5759b9209d182514f1119084b99df,2024-08-12T13:41:36.517000 +CVE-2024-40473,1,1,bac23d9f20af7f79a5f607e2c6e42e1aebf64fb29289b84bea57158dbb904513,2024-08-12T13:41:36.517000 +CVE-2024-40474,1,1,a440456ffce69fd544d7ccf24f6ae0e281bea37b7085e3b0d5340bed1d1eb38a,2024-08-12T13:41:36.517000 +CVE-2024-40475,1,1,bd96a8830e2160ceaf3b5df2cbdff8ea34b2418fe575f31155dfe3d080cc68ff,2024-08-12T13:41:36.517000 +CVE-2024-40476,1,1,2d968dbde1713118e363b700724fb5eb4428d21626fa8c69e3e4fb0e0605ef6a,2024-08-12T13:41:36.517000 +CVE-2024-40477,1,1,b99c59eda73224f5c34d4cda807e556646f39c9d25b5c311b583cf18d8afdfc5,2024-08-12T13:41:36.517000 +CVE-2024-40478,1,1,c52d89ab86aaf3f734a40597d5b00313c948fc2e1e77e0656955644084643dfa,2024-08-12T13:41:36.517000 +CVE-2024-40479,1,1,73cf6dde7ba74cacdf9c3d36464146c03f587233ecc67eb1d261bf639fa26bd5,2024-08-12T13:41:36.517000 +CVE-2024-40480,1,1,ffebbe104e7e5f7fc549389d2cc74047baebdb21bfa45794fe18ca9250ab02be,2024-08-12T13:41:36.517000 +CVE-2024-40481,1,1,e8cd1e3d6e210748f3a90997731d666b0805aedb865a25165fa50c4b18dd69e6,2024-08-12T13:41:36.517000 +CVE-2024-40482,1,1,31b235f6aeb322009edaf43befaea2002d52cb8d281c9d30f51fd88c792be3aa,2024-08-12T13:41:36.517000 +CVE-2024-40484,1,1,85c8a875926bd96379e78d76b30418e68ae2c0e615dce37b875916d332c19edd,2024-08-12T13:41:36.517000 +CVE-2024-40486,1,1,d13c18293ea3f5b839ec8274b4c792b5fe0f48540f599e2e17ba8e594b6c8ee5,2024-08-12T13:41:36.517000 +CVE-2024-40487,1,1,005a09265ebc099b9fcb5976da33b894e6213384a847e53e8ae4a2bd87b7e372,2024-08-12T13:41:36.517000 +CVE-2024-40488,1,1,b3e51fd8218a45b1f5ac6aff4a38b8cfd150d0b9486d5a376f112926ee4befe8,2024-08-12T13:41:36.517000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000 @@ -256324,7 +256378,7 @@ CVE-2024-41018,0,0,d4686c4125645eddd30834870d11d003b93b0eb7cd35144f063aba8a09330 CVE-2024-41019,0,0,250099f61de5b09d0ebec4af736d18492b0d2d580ebdd5742cde1f5131cfd721,2024-07-29T14:12:08.783000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 CVE-2024-41020,0,0,2648cd1ea7885aa6a15ad15439ad5970c22167ebbfaf88f36d6603640a0679ea,2024-07-29T16:21:52.517000 -CVE-2024-41021,0,0,354cbc7d9ab51c39164a428765b1fe45ea16fd87b2522c5f22baa8470ee9dff0,2024-07-29T16:21:52.517000 +CVE-2024-41021,0,1,80fab57b7e9e902bc5d4e6126e206f5737a727cedd90817a7e39c99f7b3679a4,2024-08-12T13:38:29.623000 CVE-2024-41022,0,0,55fcdc9633a220761bf2ee0f6eec0af74a7e91fb5065f3deb58c99d51016114b,2024-07-29T16:21:52.517000 CVE-2024-41023,0,0,48ce4747e102be8dbf6b96a23a471ccbe6850776b27384be80a54885d800aaa0,2024-07-29T16:21:52.517000 CVE-2024-41024,0,0,a83e56d28d472d169b675cbc7079dc9f720d853f9c0fe05fe88a8ff3b3b2caa6,2024-07-29T16:21:52.517000 @@ -256402,10 +256456,10 @@ CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56 CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000 CVE-2024-41092,0,0,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000 CVE-2024-41093,0,0,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000 -CVE-2024-41094,0,1,3ef0a1d7ba362336f6b41486a1e6ea689cfacb81f4caefbf7f229b0532fecea4,2024-07-29T16:21:52.517000 +CVE-2024-41094,0,0,3ef0a1d7ba362336f6b41486a1e6ea689cfacb81f4caefbf7f229b0532fecea4,2024-07-29T16:21:52.517000 CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000 CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000 -CVE-2024-41097,0,1,996fc7ddc6832456bcc3c3bea882834c3a48ba5bc102d21e2b845d47d7f656d4,2024-07-29T16:21:52.517000 +CVE-2024-41097,0,0,996fc7ddc6832456bcc3c3bea882834c3a48ba5bc102d21e2b845d47d7f656d4,2024-07-29T16:21:52.517000 CVE-2024-41098,0,0,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000 CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000 @@ -256427,7 +256481,7 @@ CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 CVE-2024-41123,0,0,8618b7a16f64f0870336097fbc285992a3f592ba239b8c1dae204e252fa5afbd,2024-08-01T16:45:25.400000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 -CVE-2024-41127,0,1,2519293e8a68005ce52133a682e98e20cf58a0421db4f824efb1564386790de3,2024-08-05T12:41:45.957000 +CVE-2024-41127,0,0,2519293e8a68005ce52133a682e98e20cf58a0421db4f824efb1564386790de3,2024-08-05T12:41:45.957000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000 CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 @@ -256444,7 +256498,7 @@ CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a CVE-2024-41144,0,0,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 -CVE-2024-41161,0,1,c97152c62d9a10c62a6668742a3fe8e6e77c1bcfdd43214f485b8756f006cd55,2024-08-08T18:55:19.180000 +CVE-2024-41161,0,0,c97152c62d9a10c62a6668742a3fe8e6e77c1bcfdd43214f485b8756f006cd55,2024-08-08T18:55:19.180000 CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000 @@ -256459,7 +256513,7 @@ CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd2 CVE-2024-41226,0,0,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000 CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000 CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000 -CVE-2024-41238,0,1,51cd0db1048dc70d266bfa4ce11fedb32f3930b86aea8e737629eb340a3178ed,2024-08-08T18:55:28.493000 +CVE-2024-41238,0,0,51cd0db1048dc70d266bfa4ce11fedb32f3930b86aea8e737629eb340a3178ed,2024-08-08T18:55:28.493000 CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000 CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000 CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000 @@ -256483,12 +256537,12 @@ CVE-2024-41256,0,0,1bf0b121e504fbd022f127340154e7cb8fcfb04505e0f7d02e6472303f883 CVE-2024-41258,0,0,76b722665ab6223e41ba7e3d8945bf1a36e3d6ce75d31b29574bb0e37bab2587,2024-08-01T12:42:36.933000 CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fccf6,2024-08-02T16:35:51.213000 CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000 -CVE-2024-41260,0,1,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000 +CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000 CVE-2024-41262,0,0,48b0074f34ada1a302a3c7c2afcfaf4594d4fd732c8b7153c8377ab26e16ee3d,2024-08-01T16:35:11.627000 CVE-2024-41264,0,0,0cb5e2c62cfe618ab7da81cff096db6d3e33cdd43ef019acee8b6c8e4d686d0c,2024-08-07T20:35:22.313000 CVE-2024-41265,0,0,96664aad23c7dd63e002634cfc71189c6e2399a9d19b5373e19abde784e31cd7,2024-08-02T16:35:52.013000 CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000 -CVE-2024-41270,0,1,0567f8e4930f4e6aeb9ef8195fc959d0ce0b69424f205cec73a3993b71e7d97f,2024-08-07T15:35:06.077000 +CVE-2024-41270,0,0,0567f8e4930f4e6aeb9ef8195fc959d0ce0b69424f205cec73a3993b71e7d97f,2024-08-07T15:35:06.077000 CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 @@ -256505,6 +256559,7 @@ CVE-2024-41318,0,0,9b1c1d0472f281a532ac7cd9f50c0be0ec0f55b0327046bb10ee1709062e9 CVE-2024-41319,0,0,1899a3684e8a27d8d6402d107bc11ca910ee14276fc605936dd401557907d526,2024-08-01T13:58:31.957000 CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e8ce,2024-08-01T13:58:32.723000 CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 +CVE-2024-41332,1,1,56ad202b80efa610d5c6ce283a82b14a04739c8323421c543c839229ab8bd6c1,2024-08-12T13:41:36.517000 CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000 CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000 CVE-2024-41353,0,0,283f710ae1d74e1c389a6d83c71bf34f8cb957eca1e713efb25da5fc972611a3,2024-08-01T13:58:33.490000 @@ -256525,9 +256580,9 @@ CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb2 CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000 CVE-2024-4143,0,0,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000 CVE-2024-41432,0,0,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000 -CVE-2024-41437,0,1,7fc5e56a66787afbd1d8dca689f9c7d444aafcd507f4e7d126f6bc864bf56744,2024-07-31T12:57:02.300000 +CVE-2024-41437,0,0,7fc5e56a66787afbd1d8dca689f9c7d444aafcd507f4e7d126f6bc864bf56744,2024-07-31T12:57:02.300000 CVE-2024-41438,0,0,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5f1a,2024-08-01T13:58:40.670000 -CVE-2024-41439,0,1,e299e8c60711eb1ab32b8e6a7b9502e5dfd55efa249807013c738c43b8c98a27,2024-07-31T12:57:02.300000 +CVE-2024-41439,0,0,e299e8c60711eb1ab32b8e6a7b9502e5dfd55efa249807013c738c43b8c98a27,2024-07-31T12:57:02.300000 CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000 CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000 CVE-2024-41443,0,0,1be6f511e21ef9a107685136f15f3c2750b611a333337ffc199f4824cee060ab,2024-07-31T12:57:02.300000 @@ -256543,7 +256598,10 @@ CVE-2024-41465,0,0,f323d3ff7dfebe22b9a686e1b54d79f6e139e7ff43c0da4ee794ccc9ea305 CVE-2024-41466,0,0,cab2b0ce626d04e7a0d17b559b41b44cbb63464fd58881e5118e54554df587f2,2024-08-01T13:58:49.187000 CVE-2024-41468,0,0,723917e91ffa0b2faf983099b56bc2d3f0cf2685feaca850f60e0aa2cedc4e5d,2024-08-02T21:09:28.420000 CVE-2024-41473,0,0,425ac543ae035b27f256c6d74a172a9469ff894b2097490bb556616203f6fd87,2024-08-02T21:09:40.267000 +CVE-2024-41476,1,1,04a77e6594a776cd3413fd5c05471920b1b10e5c34d854d3ebb891758e73f55f,2024-08-12T13:41:36.517000 CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000 +CVE-2024-41481,1,1,8aba19ab3da8a482dd9dfabe052be8c2c112aa692f0117579e187673fe5172d6,2024-08-12T13:41:36.517000 +CVE-2024-41482,1,1,9ed803d4862cda019e0f1d7d5f2f187fc334f909a159ec38deb6a90beebfa038,2024-08-12T13:41:36.517000 CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000 CVE-2024-41492,0,0,b1335de0436b7c8900c341d1fdd3cf687e177ea6dd90614e9aac145917e5dee5,2024-08-01T13:58:52.487000 CVE-2024-4150,0,0,6620986a45cd70dd6d417a583c6a5ddd7d1307e119d46c0f4cd76fea931ab7e8,2024-05-14T16:11:39.510000 @@ -256559,6 +256617,8 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189 CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000 CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 +CVE-2024-41570,1,1,ef1bf59c27127ff158179f33921003a804caaf6660e1a7e2b6ec3f026dc6edfc,2024-08-12T13:41:36.517000 +CVE-2024-41577,1,1,e7e693181f88ef240813103b284f71ca31f9c53b9cb63293a922ae2ded80048a,2024-08-12T13:41:36.517000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000 @@ -256662,7 +256722,7 @@ CVE-2024-41825,0,0,fb452acc7738f583ba1887e5930930c888951f2ba6e438e8aeadbd82e6176 CVE-2024-41826,0,0,d5e9467d8fc9cc9d6374aa2a38fef254c8a2f0bb55673878ed8159b6140d4358,2024-08-07T20:44:55.327000 CVE-2024-41827,0,0,dd07e0044373d41286520a934dd4c589cf3d101f877b5542d8da663a27cbc4ac,2024-08-07T20:44:09.373000 CVE-2024-41828,0,0,bac6542986659ecedf163ca506403cb725b474d45711d85a2777e2af865a5494,2024-08-07T20:38:22.280000 -CVE-2024-41829,0,1,22a4a0dcca3b2970ab630b469c67937ba972d035b7d005ca9244e56513db5b28,2024-07-24T12:55:13.223000 +CVE-2024-41829,0,0,22a4a0dcca3b2970ab630b469c67937ba972d035b7d005ca9244e56513db5b28,2024-07-24T12:55:13.223000 CVE-2024-4183,0,0,c95eeb02531c25674be296e55025a1bd3e47bb47f078fa8bff79c7eea74c4268,2024-04-26T12:58:17.720000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 @@ -256672,12 +256732,14 @@ CVE-2024-4187,0,0,6e41c1b7087e8ddcfaf3801328e1ee1bd29a767b33bcf1748327754d0e784a CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 +CVE-2024-41888,1,1,732035365d9dca966bbb01cf0554f084d6d5446f352b0bfbfd05d657e62c46a3,2024-08-12T13:41:36.517000 CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000 +CVE-2024-41890,1,1,db9be7aaec3f0e305c1425d168e81c684e69b3cb2cbbd809f74a130e7ea87d73,2024-08-12T13:41:36.517000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 CVE-2024-41910,0,0,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000 -CVE-2024-41911,0,1,bcede814e75673c8612430bdf7cb23c705580c34203914afdea68119c277efad,2024-08-06T16:30:24.547000 +CVE-2024-41911,0,0,bcede814e75673c8612430bdf7cb23c705580c34203914afdea68119c277efad,2024-08-06T16:30:24.547000 CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000 -CVE-2024-41913,0,1,3074702473aea59c75eb08b7aa610b21c6ce28033d8a4b7cc4c3332e60912a7c,2024-08-06T16:30:24.547000 +CVE-2024-41913,0,0,3074702473aea59c75eb08b7aa610b21c6ce28033d8a4b7cc4c3332e60912a7c,2024-08-06T16:30:24.547000 CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000 CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000 CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000 @@ -256685,8 +256747,9 @@ CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a12162631897066 CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000 CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 +CVE-2024-41936,1,1,3e7584de3119384718885fa91426c70960b6e9df5afd267fe806c0b221ea60dd,2024-08-12T13:41:36.517000 CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000 -CVE-2024-41942,0,1,28c54a5d9e1062000eb8032280c9e0371792a64b3b20f8770c5b8669e456a399,2024-08-08T18:55:28.493000 +CVE-2024-41942,0,0,28c54a5d9e1062000eb8032280c9e0371792a64b3b20f8770c5b8669e456a399,2024-08-08T18:55:28.493000 CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 @@ -256696,7 +256759,7 @@ CVE-2024-41948,0,0,95b8e7bd495b369e148a4aee32aaebfe7255dd0e1bf38771c2e96e2af8f6e CVE-2024-41949,0,0,ca775db8fe7ff2b3f65a9b7415410183458d660652f7e7a24514bfd892cb0821,2024-08-09T18:32:53.153000 CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000 CVE-2024-41950,0,0,cb384ef22df022e960189f7f7e44ba5570748379fe4c550a69c77cdcfc6aec43,2024-08-01T12:42:36.933000 -CVE-2024-41951,0,1,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1a8e,2024-08-01T12:42:36.933000 +CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1a8e,2024-08-01T12:42:36.933000 CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 CVE-2024-41954,0,0,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000 @@ -256708,17 +256771,18 @@ CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385f CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000 CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000 CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000 -CVE-2024-41962,0,1,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000 +CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000 CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000 CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000 CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000 -CVE-2024-41990,0,1,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913a10,2024-08-07T20:49:50.480000 -CVE-2024-41991,0,1,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 +CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913a10,2024-08-07T20:49:50.480000 +CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 -CVE-2024-42005,0,1,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000 +CVE-2024-42001,1,1,c920ccb78e60a1cba14a907b5ddf55b2844617362ce30bf584a1d9a6b3917020,2024-08-12T13:41:36.517000 +CVE-2024-42005,0,0,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000 CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000 CVE-2024-42008,0,0,54c5efe7cc13cbb13be4a33dc9811a7d441226bfd6f8fc26ec0019f7ccb6db29,2024-08-06T16:30:24.547000 CVE-2024-42009,0,0,b6a6b7e03bd3d7f2ada73a4d7d0bdaecb6dc8a9c6d65a8f836b258bd083ab66f,2024-08-06T16:30:24.547000 @@ -256856,18 +256920,23 @@ CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000 CVE-2024-42161,0,0,c37820156f6b32c3b0c8d53e62b0eb3e8a498c0455e3173c812581d5bb793102,2024-08-05T20:19:29.607000 CVE-2024-42162,0,0,6afe87ab720ed2f9c2f080d1a44ac6b35a3f68a956a94f09bb5c649d3b32abfa,2024-08-05T20:19:56.047000 +CVE-2024-42163,1,1,0379fd4a91ae411be802d3f2ebfd48f0988f8e326fbae2011e52b72fc1b8ae17,2024-08-12T13:41:36.517000 +CVE-2024-42164,1,1,a60a3fbe53405773879a36e39ba1bc878b96effaf85f384084ab8f0751be55e0,2024-08-12T13:41:36.517000 +CVE-2024-42165,1,1,170148f9e8211c254040fdc2046cd93a0227e5485c71db599e9db7df2f870c05,2024-08-12T13:41:36.517000 +CVE-2024-42166,1,1,6578a7a65bd27ca4bf4992fc4d317189a6b1d4127cd0e365580bd776f1be3488,2024-08-12T13:41:36.517000 +CVE-2024-42167,1,1,7c0b4f88ce5709fc01cd6ece6af06390a838cfb3e064991be7b50a47f6afcc98,2024-08-12T13:41:36.517000 CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 -CVE-2024-42218,0,1,725141e6b41557191ef1c630f6b5a78ddac9c87623e82c912d021179b5bf4f52,2024-08-08T14:35:11.900000 -CVE-2024-42219,0,1,8e2965469287006012aa75d98e769858a8b642c8370415ad136cce3a7f598abd,2024-08-07T20:35:23.967000 +CVE-2024-42218,0,0,725141e6b41557191ef1c630f6b5a78ddac9c87623e82c912d021179b5bf4f52,2024-08-08T14:35:11.900000 +CVE-2024-42219,0,0,8e2965469287006012aa75d98e769858a8b642c8370415ad136cce3a7f598abd,2024-08-07T20:35:23.967000 CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000 -CVE-2024-42222,0,1,62014732c367340e7231f93e13a11fa814d7e00cce4ded101da5e783fb41f371,2024-08-07T15:17:46.717000 +CVE-2024-42222,0,0,62014732c367340e7231f93e13a11fa814d7e00cce4ded101da5e783fb41f371,2024-08-07T15:17:46.717000 CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000 CVE-2024-42224,0,0,be03c0669f567c4c43069feb6297d1d0b39887abc231ab7cb6117aeb87386008,2024-08-02T14:24:16.187000 CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000 -CVE-2024-42226,0,0,85e1a1843ef6b9230ee103078e5f87f3a7bc00e8db591eb32209bc245bb0dcf1,2024-07-30T20:12:08.160000 +CVE-2024-42226,0,1,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13993,2024-08-12T13:38:33.853000 CVE-2024-42227,0,0,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000 CVE-2024-42228,0,0,bb35b5d07117a510d2c8f813597e1359d157744c6e3d74a8f3b969980ffe591b,2024-07-30T20:12:16.913000 CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d3a6,2024-07-30T19:46:56.943000 @@ -256909,33 +256978,35 @@ CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d5494 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000 CVE-2024-42347,0,0,897849a55f7d07df51341e7d5057e11851accc23315b1476e00ea9cfe1789201,2024-08-07T15:17:46.717000 -CVE-2024-42348,0,1,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000 -CVE-2024-42349,0,1,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de97074131bc,2024-08-05T12:41:45.957000 +CVE-2024-42348,0,0,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000 +CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de97074131bc,2024-08-05T12:41:45.957000 CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000 CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000 CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000 -CVE-2024-42354,0,1,30ce4463467770a3f73f30b712b96715e405c155b6a7c9f838420342a360f632,2024-08-08T18:55:28.493000 -CVE-2024-42355,0,1,df8fca6308adc75080a706347825a64199420b7f3b7d0ccfaaab9d0c7d9a8efa,2024-08-08T18:55:28.493000 -CVE-2024-42356,0,1,cf8e64f39847418f05c59189e8acdbf8bc095dc8210983ddd00c82067537dcea,2024-08-08T18:55:28.493000 -CVE-2024-42357,0,1,f1441d8b448795335a1982c2719819142b994d95ca4b3757bafad9fb12bdf34d,2024-08-08T18:55:28.493000 +CVE-2024-42354,0,0,30ce4463467770a3f73f30b712b96715e405c155b6a7c9f838420342a360f632,2024-08-08T18:55:28.493000 +CVE-2024-42355,0,0,df8fca6308adc75080a706347825a64199420b7f3b7d0ccfaaab9d0c7d9a8efa,2024-08-08T18:55:28.493000 +CVE-2024-42356,0,0,cf8e64f39847418f05c59189e8acdbf8bc095dc8210983ddd00c82067537dcea,2024-08-08T18:55:28.493000 +CVE-2024-42357,0,0,f1441d8b448795335a1982c2719819142b994d95ca4b3757bafad9fb12bdf34d,2024-08-08T18:55:28.493000 CVE-2024-42358,0,0,bfdfea3765abe743074eccf4e4988e900f51d95c87e996dc4c204d5e5db7c300,2024-08-07T15:17:46.717000 CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000 -CVE-2024-42365,0,1,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 -CVE-2024-42366,0,1,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 +CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 +CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbee28,2024-08-08T18:55:19.180000 +CVE-2024-42367,1,1,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 +CVE-2024-42370,1,1,bc0a8d588f536f34911e68724023599a65528bc23b4d4f6cda3f1a23005982af,2024-08-12T13:41:36.517000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000 CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000 CVE-2024-42393,0,0,5dd44c9308d36b411fed5411a98459070241dd2bf710d7dad45f46ec0d5bad2d,2024-08-07T15:17:46.717000 CVE-2024-42394,0,0,8620f2200c19aa777678f20e32bb1e445009605fa585ff86df761a7b63f61fb2,2024-08-07T15:35:07.267000 CVE-2024-42395,0,0,e1c76c107b3f7053fd30c6ccc9feaab55edee78b1124907a4f272d01f9bc9027,2024-08-08T15:35:20.467000 -CVE-2024-42396,0,1,d97d034a7ad9895491afdc99bffda4ea78d07d6f7889f1b3d194314f534c15aa,2024-08-07T15:17:46.717000 -CVE-2024-42397,0,1,5fbd8f65a5f42a271758330d49c4d6490170171e164de74982b7d435aaa6fce9,2024-08-07T15:17:46.717000 -CVE-2024-42398,0,1,8cfb49b96708fc6b6d561977d3d16bfbb25b9745a880e82b9d53c7af5bd46123,2024-08-07T15:17:46.717000 -CVE-2024-42399,0,1,24d112c6ee31ad1ac390e0c962be1b8e973253240f9f4764483614cc4804756f,2024-08-07T15:17:46.717000 +CVE-2024-42396,0,0,d97d034a7ad9895491afdc99bffda4ea78d07d6f7889f1b3d194314f534c15aa,2024-08-07T15:17:46.717000 +CVE-2024-42397,0,0,5fbd8f65a5f42a271758330d49c4d6490170171e164de74982b7d435aaa6fce9,2024-08-07T15:17:46.717000 +CVE-2024-42398,0,0,8cfb49b96708fc6b6d561977d3d16bfbb25b9745a880e82b9d53c7af5bd46123,2024-08-07T15:17:46.717000 +CVE-2024-42399,0,0,24d112c6ee31ad1ac390e0c962be1b8e973253240f9f4764483614cc4804756f,2024-08-07T15:17:46.717000 CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000 -CVE-2024-42400,0,1,e23fa86955810ac61993a53dac28992470f4d4df1a643f460294725e3f989414,2024-08-07T15:17:46.717000 -CVE-2024-42408,0,1,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000 +CVE-2024-42400,0,0,e23fa86955810ac61993a53dac28992470f4d4df1a643f460294725e3f989414,2024-08-07T15:17:46.717000 +CVE-2024-42408,0,0,0fd118b3a6a95e06e83a123b887271565b346236de9b0c1f76b537fd25503dbf,2024-08-08T18:55:19.180000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 @@ -256947,10 +257018,15 @@ CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000 CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000 CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449bf17,2024-08-07T19:35:13.447000 +CVE-2024-42467,1,1,4d22b6210d07d5f3c254f02dd41ae3cecad0c4d515c80021ed5ec249d7082a04,2024-08-12T13:41:36.517000 +CVE-2024-42468,1,1,76cb3122a8232cee530b0374441c48dedc4c3d24ff695d723500b8a92fe30bc6,2024-08-12T13:41:36.517000 +CVE-2024-42469,1,1,b65049b5c4751d92c1e0b91c507812510fe11805ae8aa9f7a38c440861e678c6,2024-08-12T13:41:36.517000 CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000 +CVE-2024-42470,1,1,c2337f1ff190575de6395575b084daf7bce25ccaf9e3e76f2820207f899cd76d,2024-08-12T13:41:36.517000 +CVE-2024-42473,1,1,4ed1851fb406b4127fd12c2bea40398eaaed7991df0df7d58ed2677a68f6e622,2024-08-12T13:41:36.517000 CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 -CVE-2024-42493,0,1,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000 +CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 @@ -257000,8 +257076,8 @@ CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5c CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 -CVE-2024-43044,0,1,2dbbef33f99d7cbcabcc19e81e19ebf43163c5d81893c4595ee6a39205a72744,2024-08-07T15:17:46.717000 -CVE-2024-43045,0,1,6c09b38c22660d5e17b2c923e52895837b1f6e1429e2502f70318f1f62bcf3fa,2024-08-07T15:17:46.717000 +CVE-2024-43044,0,0,2dbbef33f99d7cbcabcc19e81e19ebf43163c5d81893c4595ee6a39205a72744,2024-08-07T15:17:46.717000 +CVE-2024-43045,0,0,6c09b38c22660d5e17b2c923e52895837b1f6e1429e2502f70318f1f62bcf3fa,2024-08-07T15:17:46.717000 CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 @@ -257009,18 +257085,20 @@ CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 CVE-2024-43111,0,0,f62efcceb5ca8831b50b8cf6203a83ed8d98a025353eabc40d90f197fefec403,2024-08-07T15:35:08.127000 -CVE-2024-43112,0,1,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca28a,2024-08-06T16:30:24.547000 -CVE-2024-43113,0,1,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000 -CVE-2024-43114,0,1,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000 +CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca28a,2024-08-06T16:30:24.547000 +CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000 +CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000 CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000 CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000 CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000 CVE-2024-4315,0,0,392e78ede02028792ceca327e706bfb19bc55163d6718415b77f2fda1df1c705,2024-06-13T18:36:09.013000 CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000 +CVE-2024-43167,1,1,01f17fcd63c756d83b948d0875b4414e12688ba0576962ac27da499c54ee819d,2024-08-12T13:41:36.517000 +CVE-2024-43168,1,1,6f1ce3e85e6cec75b3ae8101a2990b1aa3eb274cac98a0b799813d7d71452062,2024-08-12T13:41:36.517000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097afb,2024-05-16T13:03:05.353000 CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 -CVE-2024-43199,0,1,5fd637f4452803f34ec59312d8f8fad8008cd8a65f5fb004a872037b900603de,2024-08-07T21:35:10.297000 +CVE-2024-43199,0,1,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000 @@ -257049,14 +257127,17 @@ CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000 CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 +CVE-2024-4350,1,1,cb6f3084c65926bf492af7714b4ea736ff00367edc671940fa16c36db643b45e,2024-08-12T13:41:36.517000 CVE-2024-4351,0,0,1afa7cdd2b07ed7f6c7d4fd33431ae4e847e5055e80de2c2ff284dbdde180a83,2024-05-16T13:03:05.353000 CVE-2024-4352,0,0,83fde2dc0fb70bd9398ce4f7dc00180654ce0fb46c0f63d8091186b07c4c5ecb,2024-05-16T13:03:05.353000 -CVE-2024-4353,0,1,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 +CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 CVE-2024-4354,0,0,664e83e852799af34d5f786f17cdf52435e913db328cd710bdb953811fde5eb8,2024-07-18T16:14:41.387000 CVE-2024-4355,0,0,44d760d2293a7a0b9f294a1ecb6d78b7ed5fc4a36b90344217d2adaa7ff81f7d,2024-05-30T13:15:41.297000 CVE-2024-4356,0,0,c314fe1608f5a3b59bb87f88c052e04f3d51ca5a5e09c7b63a9301a39fa91b0f,2024-05-30T13:15:41.297000 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 +CVE-2024-4359,1,1,1bdb71b4aa83d040abb64923eeb3ba5dca2d51c848ef9cceb328ab81429f5c17,2024-08-12T13:41:36.517000 +CVE-2024-4360,1,1,3fee9475fb3ad96462c8e4c66b8aa776fc961e6287a5d9007edd1d94c573bcc7,2024-08-12T13:41:36.517000 CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000 CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000 CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000 @@ -257278,7 +257359,7 @@ CVE-2024-4603,0,0,7bca9f2dadfec866e13d2cb237a0cdfb3e7733f93330ed987bf2cce70155b7 CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,1762c1d15ebc2ec60093a6d78e47c2427107d80c6a65abde0809dacb63c557b9,2024-05-14T16:11:39.510000 -CVE-2024-4607,0,1,004e8eac2b665252b6f4f4efb9e0368d47cb2a0d5c21b51a504d30a58de38b18,2024-08-05T16:35:14.117000 +CVE-2024-4607,0,0,004e8eac2b665252b6f4f4efb9e0368d47cb2a0d5c21b51a504d30a58de38b18,2024-08-05T16:35:14.117000 CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000 CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000 CVE-2024-4610,0,0,9d1f5948ee247bb460ec957dcfec1558fe286260475ff78c506e184740f1e859,2024-07-03T02:07:50.390000 @@ -257499,7 +257580,7 @@ CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 -CVE-2024-4862,0,1,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000 +CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000 CVE-2024-4863,0,0,a7452bc03047df9dfe2f17de61b10d1bcd60cf90a2b2dad4486f933b8b326310,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 @@ -257869,7 +257950,7 @@ CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a64 CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000 CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 -CVE-2024-5290,0,1,adacdfd631af0a2d0e8f586387cac872823eb4764e0466b1013d4b9bdcf14abe,2024-08-07T15:17:46.717000 +CVE-2024-5290,0,0,adacdfd631af0a2d0e8f586387cac872823eb4764e0466b1013d4b9bdcf14abe,2024-08-07T15:17:46.717000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,46d8600092b67d78419e8396a0475f44ad2d697d614c735fcdb066f1cf0c44cc,2024-05-24T01:15:30.977000 CVE-2024-5293,0,0,a0cc00d9353625760ac0d77b1ffd0d6d05d987e18d154ce46567c1580d6373f0,2024-05-24T01:15:30.977000 @@ -258007,6 +258088,7 @@ CVE-2024-5441,0,0,cd7b1b15236c7a2c2414b795b6ffce4b233942605e4b788f9b1cefb9a565ec CVE-2024-5442,0,0,f0344b30188ce4a2cc91890b56972762cdbd29ec292a7ecf6018b5a0f024916a,2024-08-01T13:59:46.210000 CVE-2024-5443,0,0,5355e7ea1610df75dc467c6771933fd6a627b9eafa985364872ccc88c9e02e01,2024-06-24T12:57:36.513000 CVE-2024-5444,0,0,7a2603f1e6478613a17365e974ef612aa2f89724976e490873c8e2e39efd0067,2024-07-15T13:41:20.447000 +CVE-2024-5445,1,1,751ac0ac4812c5f97e3521b1ffe5c50040c1f424e273fe7373330e7c2e890072,2024-08-12T13:41:36.517000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,c1e6c0786c1e275f994246efd4bba7bddfb8ded5af596514af2741d165623e37,2024-07-24T17:47:44.637000 @@ -258039,6 +258121,7 @@ CVE-2024-5483,0,0,2e97255179d42c1fdc159b28df8a118b6b7a66fe00e7310d283bd122fc23ff CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,5ff776ceb9b311264eb0a3fd1aecab1cf4920b9e3fce511521464a36e3b91a61,2024-06-04T16:57:41.053000 CVE-2024-5486,0,0,f91d9d4f8dd33400d578f70c776b5213e5c4514fd91351556f80643703e916a7,2024-07-31T12:57:02.300000 +CVE-2024-5487,1,1,df8df2b32a796e85e74358cbc0c98ac9af38c9d8e2927daa844eb228bde7269d,2024-08-12T13:41:36.517000 CVE-2024-5488,0,0,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,855f98d82c4255d7a1decf5a548f61d8944b9bffb6e3f6a5299c190e758f26a4,2024-06-11T18:15:01.617000 CVE-2024-5491,0,0,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 @@ -258072,6 +258155,7 @@ CVE-2024-5523,0,0,d7a88b58421b5d1ae546562c97be2066f98eb204a278a9729ed09f63f682e1 CVE-2024-5524,0,0,acc6c718843a634b3681eccc60375ca60bf82b8427b94da2351e444fa46af424,2024-05-31T13:01:46.727000 CVE-2024-5525,0,0,02c49ace47b04c4d76443f16f3ee0a6fe51259c43b6dd84bf29c79a7efe72454,2024-05-31T13:01:46.727000 CVE-2024-5526,0,0,60bf48d4ea40ca252e5afebf1dc1ad6e5a4db01756ddf2bd31cc94e151a8720b,2024-06-11T17:25:55.677000 +CVE-2024-5527,1,1,20a2c391b80d1045eb0db48eb14eacb2b8d30a2df4ac5642eea1cd32d6591bd8,2024-08-12T13:41:36.517000 CVE-2024-5529,0,0,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000 CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,6e18bd4c00ec4db4743368aa05b5d810d40ae0d6bb9ac604deef69554fbe362e,2024-06-11T13:54:12.057000 @@ -258160,6 +258244,7 @@ CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda1 CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000 CVE-2024-5649,0,0,852ca7872009baccfafdaae89cb4c14a0a1251efee63fc8b4145a812e05b230f,2024-06-20T12:44:01.637000 CVE-2024-5650,0,0,c39b4a582c551c0a2a7178518ad417e8ac9a87e5b86c36cc6d93d2e99ad988c5,2024-06-17T12:42:04.623000 +CVE-2024-5651,1,1,ab0e04ab211cac022977e795dba5300e15678398f955dc842eae1dae43721b29,2024-08-12T13:41:36.517000 CVE-2024-5652,0,0,7e423119960d286a82f2194dff7590cb101783621bba898f5af7050faa75102a,2024-07-12T17:14:32.033000 CVE-2024-5653,0,0,b1d5d7ca6c03c0860bfa9c89a981cb1e40654b9c0dd686ee52416437c8a7183f,2024-07-25T12:45:19.830000 CVE-2024-5654,0,0,be6d98376b5bde79348830f6677e04bc437e5abfb9a06a2bd0a591f9c8d1c938,2024-06-10T02:52:08.267000 @@ -258248,7 +258333,7 @@ CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452ef CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-5765,0,0,79117abfade54ce3ab13d72bbbbedb2fc58ed3797b29d0ebf953e2abb4b24073,2024-08-01T13:59:59.193000 CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000 -CVE-2024-5767,0,1,8d9d357fa8f1e1cae5533e88ea0736375963b6a4fbe13fa9a151a36ba280f19a,2024-07-09T16:23:07.280000 +CVE-2024-5767,0,0,8d9d357fa8f1e1cae5533e88ea0736375963b6a4fbe13fa9a151a36ba280f19a,2024-07-09T16:23:07.280000 CVE-2024-5768,0,0,8a490ed493d8c155ddaf62bd42a8c332a10ab098da1f8113e24f2cfb8a80f0bb,2024-06-20T12:44:01.637000 CVE-2024-5770,0,0,4bca1b783fab441ac96e2081292bf7a961039192f4cb006a7b822eed7d2abd50,2024-06-10T02:52:08.267000 CVE-2024-5771,0,0,9279677701f72e58df3eeb7baa3d1d7e55447f394eec836bc1f43570eba66aed,2024-06-10T02:52:08.267000 @@ -258275,6 +258360,8 @@ CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc0 CVE-2024-5795,0,0,f96bd55511ad8d513f3ec0decf8876ed6554642b2cf81135dc3a93534acc202d,2024-07-17T13:34:20.520000 CVE-2024-5796,0,0,e179556883d33099fab8768b9c3d50a47b2a022b7b46e47f95f4ba7640cc26df,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,8c4fc55b5a68256010d6e6bfcfe06ef9f209d5a592c838664e8662bbc4a3d762,2024-06-13T18:36:09.010000 +CVE-2024-5800,1,1,862a1cf70692f5a992d9da8a6829844ae848d130c0dde19053b4060524d34b96,2024-08-12T13:41:36.517000 +CVE-2024-5801,1,1,2646715ca338feaa393fe8f2fa25edd21843b7f3420b934d30c263f0036f9797,2024-08-12T13:41:36.517000 CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000 CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000 CVE-2024-5805,0,0,f734cfbda04e521c3e66e4ddc2a1025a96de47f7633c45b189fcc72ae4a4191a,2024-06-25T18:50:42.040000 @@ -258363,7 +258450,7 @@ CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000 CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000 CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000 -CVE-2024-5924,0,1,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000 +CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 CVE-2024-5926,0,0,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20e3,2024-06-13T11:15:48.917000 @@ -258383,7 +258470,7 @@ CVE-2024-5949,0,0,4572c12d3ad878ee653901722f7c16c0dabd647af42f6f6ae5a5828547615d CVE-2024-5950,0,0,f2973766f812398c51fdc9e52a19a5f151706c2da451b30e218939a121000c2a,2024-08-07T18:12:58.253000 CVE-2024-5951,0,0,6febf2923b11ad8e5c0b580c95ce8478dd937b62c84a55da1a853959f3aac15d,2024-08-07T18:12:55.977000 CVE-2024-5952,0,0,4b0244413edcc544ed5c05479b5dbc3eeb5d75652ce440b39e8ad3eb0aaa28bb,2024-08-07T17:50:09.493000 -CVE-2024-5953,0,0,757b6f0941133cbc599aeeca7743ac151fc9af23a43f0957c3319b50656b951f,2024-08-06T16:15:49.570000 +CVE-2024-5953,0,1,9f46daa6c571dce2c2ecdf2bd38bf4d61c52513a19f8abc23bb19202a887298b,2024-08-12T13:38:38.430000 CVE-2024-5961,0,0,458be8cb6fdb0d558a4d51d11b5f294250dd9695661afd805b88290bb2df249d,2024-06-17T12:42:04.623000 CVE-2024-5963,0,0,a4cccf44b2eb0314cba658473713210aafeaf2066181b69f96f839930da4f321,2024-08-06T16:30:24.547000 CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000 @@ -258392,7 +258479,7 @@ CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339 CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e27,2024-06-20T12:44:01.637000 CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 -CVE-2024-5971,0,0,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000 +CVE-2024-5971,0,1,01d70de536a697a1c65e871f029e293b5051eed9b63fc3f224826d44a6d72378,2024-08-12T13:38:38.567000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000 CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 @@ -258515,6 +258602,9 @@ CVE-2024-6128,0,0,e064ff8d5dabba517cce591bd7ae4e33f1f46e689b63e72521fbd8f55a944d CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42b3,2024-06-20T12:44:01.637000 CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000 CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000 +CVE-2024-6133,1,1,11351dbf03414755557a4338a4e441faef4dbbe801099e87415062f11fdcaa9d,2024-08-12T13:41:36.517000 +CVE-2024-6134,1,1,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000 +CVE-2024-6136,1,1,3854e1d581f6127f9b8244a143e3c0b775f6e26042c869e1df7f773222d1ecd1,2024-08-12T13:41:36.517000 CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000 CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000 CVE-2024-6142,0,0,b186966dd1e43431007a65ef388b5fc16ca959c5df4a79ac4b3d70a69eba9543,2024-06-20T12:44:01.637000 @@ -258530,6 +258620,7 @@ CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d7 CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000 CVE-2024-6153,0,0,aefe9e23b8ed1d87e58382d973bdf0f329fa76bb8df894b701324ee041e253eb,2024-06-21T11:22:01.687000 CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda24384133e,2024-06-21T11:22:01.687000 +CVE-2024-6158,1,1,ea462e929b181c85e24cd7a7a53cc9232157f7c818e5330b2e1c85115dde10f0,2024-08-12T13:41:36.517000 CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000 CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000 @@ -258594,7 +258685,7 @@ CVE-2024-6230,0,0,bf151baddd2ddda2ffc17d61da16c35249c79c364900f3698bb671ab91ccc4 CVE-2024-6231,0,0,17c4018e99632a925bda52d838c86b1f2075d6f0c7798f87d32fed09cbff22a1,2024-08-01T14:00:16.470000 CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000 -CVE-2024-6237,0,0,677ec0aee6a801abea7ab9038fb8bb7676c33372e2f91191910a993cdc7b1fe5,2024-08-06T16:15:49.690000 +CVE-2024-6237,0,1,8762afad911d25272cef1e25e793265b79c2ac5f7d12b159ff8ab393df4b7ad2,2024-08-12T13:38:38.977000 CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ffd0,2024-06-25T18:50:42.040000 CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 @@ -258607,7 +258698,7 @@ CVE-2024-6251,0,0,4ff3c6977b6838552fca6fd96450148c0a810a0b49d59064a41fd5d7df8c39 CVE-2024-6252,0,0,f925951499780a86ba894fc39baf0f6088fcb6c4e2787ea242a732a2e35ea460,2024-06-26T19:15:14.383000 CVE-2024-6253,0,0,d70df9ffdc81f7d3511638a8a32373070f208c5646ec9496ca814b85bf15f7ca,2024-06-25T18:15:12 CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a35,2024-08-08T13:04:18.753000 -CVE-2024-6255,0,1,15c3e932a63607f61e9c4d0fec2f9bb5162ddaef2671d16a452e1698f0f69dd3,2024-07-31T12:57:02.300000 +CVE-2024-6255,0,0,15c3e932a63607f61e9c4d0fec2f9bb5162ddaef2671d16a452e1698f0f69dd3,2024-07-31T12:57:02.300000 CVE-2024-6256,0,0,cd0156365b21d4bea53ae3ad70dcec4b1c8c7fe2a610d4e79db68145fb523cc9,2024-07-12T16:53:35.083000 CVE-2024-6257,0,0,9068db2cec3557427b4184684513a4bf48773ad544b747d98a6b6caebef9018b,2024-06-25T18:50:42.040000 CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc3623e,2024-06-27T12:47:19.847000 @@ -258672,7 +258763,7 @@ CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089 CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000 CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000 CVE-2024-6329,0,0,0297471d5ff859b5002d32cf7c9376114df7d0652dd734345b853093c75ae3a1,2024-08-08T13:04:18.753000 -CVE-2024-6331,0,1,c6787bd55270acc7343ac6783b2d9d688cd57b7e4b276e49ad54dc36ae42c1b9,2024-08-05T12:41:45.957000 +CVE-2024-6331,0,0,c6787bd55270acc7343ac6783b2d9d688cd57b7e4b276e49ad54dc36ae42c1b9,2024-08-05T12:41:45.957000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000 CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000 @@ -258685,9 +258776,9 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000 CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000 CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000 -CVE-2024-6357,0,1,4ee6a38008e184f996826d8054e6f431d455429f4e1ea2ff0b08eb057aac0f28,2024-08-06T16:30:24.547000 -CVE-2024-6358,0,1,9c30ce1af1ca273e6ad36d7e128923258e4e650d091c7edc818db1f39fb0eabf,2024-08-06T16:30:24.547000 -CVE-2024-6359,0,1,c435f224b0b9643929b1b272d472f51512479418eedb9e88c214a5a4c916f226,2024-08-06T16:30:24.547000 +CVE-2024-6357,0,0,4ee6a38008e184f996826d8054e6f431d455429f4e1ea2ff0b08eb057aac0f28,2024-08-06T16:30:24.547000 +CVE-2024-6358,0,0,9c30ce1af1ca273e6ad36d7e128923258e4e650d091c7edc818db1f39fb0eabf,2024-08-06T16:30:24.547000 +CVE-2024-6359,0,0,c435f224b0b9643929b1b272d472f51512479418eedb9e88c214a5a4c916f226,2024-08-06T16:30:24.547000 CVE-2024-6361,0,0,c78d54a60cbe74050dfcceec663bceae239fbbf7a647cea8c5a73a6e5ad54d91,2024-08-06T16:30:24.547000 CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000 CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000 @@ -258777,7 +258868,7 @@ CVE-2024-6494,0,0,5d616b6f04502e7b8421d6bcde94ff1c84cc44e101748b87939c18b401c713 CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000 CVE-2024-6496,0,0,4f2145d6969061de095037c65c4c02c00a89d2331ecd0d31a6eacfc030927f42,2024-08-07T14:35:07.403000 CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000 -CVE-2024-6498,0,1,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000 +CVE-2024-6498,0,0,630981d31a800e5a325158bdb522b2e1db688d536ea57caaef1013f6348f0ce8,2024-08-05T12:41:45.957000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 @@ -258788,7 +258879,7 @@ CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202a CVE-2024-6518,0,0,7a127ef3c2d090457ff99a50f0f761572ef9ee379e26194986d16a2b77609a00,2024-07-29T14:12:08.783000 CVE-2024-6520,0,0,da4b03a9e11126ab0f0a0894cb8a440cfc63b3916dfee33ced3ffb195efafdaf,2024-07-29T14:12:08.783000 CVE-2024-6521,0,0,61feca14382c37723c4016962cdcfba87f0789845a7f3eab7e4a9b311bd86af9,2024-07-29T14:12:08.783000 -CVE-2024-6522,0,1,57b6846d29921e8cee4fe4e801365e7e03862527d6b402bc781bfd457598eb8d,2024-08-07T15:17:46.717000 +CVE-2024-6522,0,0,57b6846d29921e8cee4fe4e801365e7e03862527d6b402bc781bfd457598eb8d,2024-08-07T15:17:46.717000 CVE-2024-6523,0,0,98f0a109b2eb43c22795bc145187860635580ebf6919d959b6614038101f8043,2024-07-08T16:47:11.437000 CVE-2024-6524,0,0,4164bb0736c03a505788360f1634f8030b5ce4107a78a58256f3b4682fe3c19a,2024-07-08T15:33:01.377000 CVE-2024-6525,0,0,ba894dd056b523e3a78ec485da8f202cf728386aced7a7f6c74879813565d4e3,2024-08-01T22:15:45.760000 @@ -258817,6 +258908,7 @@ CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d CVE-2024-6558,0,0,80bb4db184b5e092f77800c9ee0ef41022e963bac58d9cb1fdeb51b7e7504217,2024-07-26T12:38:41.683000 CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000 CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000 +CVE-2024-6562,1,1,4822995966677dab6da0f49d7f93786d3fcd323a4db6975ffff3f5978def603b,2024-08-12T13:41:36.517000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000 @@ -258865,6 +258957,7 @@ CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84f CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000 CVE-2024-6637,0,0,59f76fa21430fd2f815d25b14c560949a8f50f1f9b39a99ada5c48c5c42ab47c,2024-07-22T13:00:31.330000 CVE-2024-6638,0,0,e1ef78f4a331a1760f078cffbff2fa855ff8b1eb633d9ef9812bbb8cfee1af62,2024-07-24T12:55:13.223000 +CVE-2024-6640,1,1,7735f7922e57104d4d6028c5ebbc660808921fcfa165fd2e6fa7bd8956db7cb3,2024-08-12T13:41:36.517000 CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000 CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000 CVE-2024-6644,0,0,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168f9,2024-07-11T13:05:54.930000 @@ -258889,12 +258982,15 @@ CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18 CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000 CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000 CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000 +CVE-2024-6684,1,1,cc21adccfdced4b65b3f1be5183a2b3571d5baa54428596bc336ebb90ad9d13f,2024-08-12T13:41:36.517000 CVE-2024-6687,0,0,ff47b1397711b8cc3d93cfe454be390cc9012eec28a4b5d25b3eacdb0bcb37ed,2024-08-01T12:42:36.933000 CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000 +CVE-2024-6691,1,1,6f5f8f9827af298635bb3be8698957ac1ba00c753a71503b0b1f47f556bbcece,2024-08-12T13:41:36.517000 +CVE-2024-6692,1,1,6b0c339ec0e0f80195e08930403ddbe37a0b406076e4e09872d369fdf8669d8e,2024-08-12T13:41:36.517000 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 CVE-2024-6695,0,0,99ceef595ada6c305df9cf6da95af28747b0bb8e4a9bd8bdcd9193a7cc73001a,2024-08-01T14:00:34.400000 CVE-2024-6698,0,0,89497c4dbd46e9ca69b6c9e20c77840978d4a56c74e425e3a4babf4cd1ed1264,2024-08-01T12:42:36.933000 -CVE-2024-6699,0,1,6ab729a29197bfedee1b1cdd0ebefc0ea7ecb94902c78d3c52c6633bd2c89dbb,2024-07-30T13:32:45.943000 +CVE-2024-6699,0,0,6ab729a29197bfedee1b1cdd0ebefc0ea7ecb94902c78d3c52c6633bd2c89dbb,2024-07-30T13:32:45.943000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -258937,6 +259033,9 @@ CVE-2024-6753,0,0,79cd533ef788d1e388d91ad96dd06c23d644eb06446486c79597aa813abb65 CVE-2024-6754,0,0,bc8cde0e84d8997b1c75c8ce06ab5236a2f6d5b64ebe5ed2b11b2213361d556f,2024-07-24T12:55:13.223000 CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d4845c,2024-07-24T12:55:13.223000 CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000 +CVE-2024-6758,1,1,8e0c8009cd76a9d4bc65a9116d366555cd008b71f0b28146b5ec5f874a85e601,2024-08-12T13:41:36.517000 +CVE-2024-6759,1,1,1a1f631e5a9152eebafaecce5e813806da82bcd897f1d3c6f27038b0fda6f096,2024-08-12T13:41:36.517000 +CVE-2024-6760,1,1,8375f9a099e5cbb4862dd7553e9d084f12b71d9ecc9e58b816e97e99161fe8e4,2024-08-12T13:41:36.517000 CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000 CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000 CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000 @@ -258950,7 +259049,7 @@ CVE-2024-6777,0,0,ca29db0995c8af0d3bc27804bd1f135839d6af869a949f56fbd75929b6968b CVE-2024-6778,0,0,84b088ec3020aa8ff5e55451d795a5507972d54955d86abc44832d806c764933,2024-08-01T14:00:42.093000 CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b9702520701b,2024-08-01T14:00:42.927000 CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000 -CVE-2024-6781,0,1,e24636cf8aa31acaa4171fe3fd81abcf69649ed380806bfafc0afca571326c8f,2024-08-06T16:30:24.547000 +CVE-2024-6781,0,0,e24636cf8aa31acaa4171fe3fd81abcf69649ed380806bfafc0afca571326c8f,2024-08-06T16:30:24.547000 CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000 CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000 @@ -259025,7 +259124,7 @@ CVE-2024-6947,0,0,f36a1df3259beee7d31a4643dc4fbd02db27e2571d5c24ce962e3f3a377289 CVE-2024-6948,0,0,0b9fbb236c6e3f5ea21d1e35e20ae66f7f191a5cc171b7ef9247f18011e040b5,2024-07-22T13:00:31.330000 CVE-2024-6949,0,0,50fb9ada1c84c7692d0a258888bcfbeb043b4a29416a40cdc9f5aa2aa0edc74b,2024-07-22T13:00:31.330000 CVE-2024-6950,0,0,eef15633338af4a4d46f21c9ea1976ad7775894e17137260e2d107902fc3b3ff,2024-07-22T13:00:31.330000 -CVE-2024-6951,0,1,58bf39f42f2e1f176cee8694e427847c6223f7207f66195526ca75ec8ead0568,2024-07-22T13:00:31.330000 +CVE-2024-6951,0,0,58bf39f42f2e1f176cee8694e427847c6223f7207f66195526ca75ec8ead0568,2024-07-22T13:00:31.330000 CVE-2024-6952,0,0,a08e5a7066bd396c2aefd3506579f93e73ece62f3d82ce6eb270f41ca0cf2f58,2024-07-22T13:00:31.330000 CVE-2024-6953,0,0,b3e4ee6a93232d8a3e9da27a1d2bdcdeeef98c335a469e3b587384a02990e2ec,2024-07-22T13:00:31.330000 CVE-2024-6954,0,0,57d1aafa105612df916d72d42974c524be525191df88a4decb974ac22d3eb21c,2024-07-22T13:00:31.330000 @@ -259045,11 +259144,11 @@ CVE-2024-6968,0,0,57675d10d151b515d8654e4a2d23336a097aabe29c179fc0cfbb72272365b2 CVE-2024-6969,0,0,2345a97b06e5d388bdf778f25c67289987f0f6d0622466c7c196f2cd07649113,2024-07-25T15:38:51.787000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 -CVE-2024-6973,0,1,f4f6073cfad6735c79993dea118c012d4505943ec69d6e1dd04d0e4ec60e6fc6,2024-08-01T12:42:36.933000 -CVE-2024-6974,0,1,0f2c57a0b6e33d113e00a8a1570fe02e8980b39103fbee4b1e3af1f668bf7f41,2024-08-01T12:42:36.933000 -CVE-2024-6975,0,1,15979b9249e6bdc803539d85736559a73e3fea8f82dac60b101316bd1f5224e1,2024-08-01T12:42:36.933000 -CVE-2024-6977,0,1,c7a3049d219ef210744e82560f9da2a18f28102765c92fbb1461b7e9afe1de6d,2024-08-01T12:42:36.933000 -CVE-2024-6978,0,1,64a88bc34d513859dd2dd041cf1a8a5612d656d4dc0f406f1231eec35017bb61,2024-08-01T12:42:36.933000 +CVE-2024-6973,0,0,f4f6073cfad6735c79993dea118c012d4505943ec69d6e1dd04d0e4ec60e6fc6,2024-08-01T12:42:36.933000 +CVE-2024-6974,0,0,0f2c57a0b6e33d113e00a8a1570fe02e8980b39103fbee4b1e3af1f668bf7f41,2024-08-01T12:42:36.933000 +CVE-2024-6975,0,0,15979b9249e6bdc803539d85736559a73e3fea8f82dac60b101316bd1f5224e1,2024-08-01T12:42:36.933000 +CVE-2024-6977,0,0,c7a3049d219ef210744e82560f9da2a18f28102765c92fbb1461b7e9afe1de6d,2024-08-01T12:42:36.933000 +CVE-2024-6978,0,0,64a88bc34d513859dd2dd041cf1a8a5612d656d4dc0f406f1231eec35017bb61,2024-08-01T12:42:36.933000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000 CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000 @@ -259068,19 +259167,20 @@ CVE-2024-7001,0,0,c36cc44ed743aca43eac7951b6662bd893691f9a45d57142d09098c4fe318e CVE-2024-7003,0,0,c2f51c1b71164a15818ef9209a48a467e859077ffdde417023c4b7a222f91993,2024-08-07T19:52:18.500000 CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa444,2024-08-07T21:32:44.190000 CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000 +CVE-2024-7006,1,1,d9b22c9d2489a41f77077e91587898b3e051ca6f21314114fd319370a63daa3c,2024-08-12T13:41:36.517000 CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000 -CVE-2024-7008,0,1,ff87d478ca9fb0d6caf6b0aaa7fee862b967b7c728a593ac30af375f28788cbc,2024-08-06T16:30:24.547000 -CVE-2024-7009,0,1,922a39893536ffa7ba5eb09abd072489ca61d5474d3ecc496a4eea933227f8f1,2024-08-06T16:30:24.547000 +CVE-2024-7008,0,0,ff87d478ca9fb0d6caf6b0aaa7fee862b967b7c728a593ac30af375f28788cbc,2024-08-06T16:30:24.547000 +CVE-2024-7009,0,0,922a39893536ffa7ba5eb09abd072489ca61d5474d3ecc496a4eea933227f8f1,2024-08-06T16:30:24.547000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 -CVE-2024-7029,0,1,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c22,2024-08-05T12:41:45.957000 +CVE-2024-7029,0,0,5175bec03cf7f2378284f608514536d153bc0fcc9978511b168a2887b7029c22,2024-08-05T12:41:45.957000 CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000 CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000 CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000 CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 -CVE-2024-7061,0,1,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000 +CVE-2024-7061,0,0,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000 CVE-2024-7062,0,0,d6f409aeb13130ff6f4252d4a7aadcbcfc3eecb0d68f9e3338eff0add9df7d66,2024-07-26T12:38:41.683000 CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000 CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000 @@ -259107,10 +259207,10 @@ CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be44 CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000 CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000 CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000 -CVE-2024-7127,0,1,6b292748e8421eae2ee17ad044bc14a6084b68762b6284b02f94a1dd672b3c81,2024-07-30T13:32:45.943000 +CVE-2024-7127,0,0,6b292748e8421eae2ee17ad044bc14a6084b68762b6284b02f94a1dd672b3c81,2024-07-30T13:32:45.943000 CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000 CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000 -CVE-2024-7143,0,1,444409226f2889debaa1b6cea63b846cc438f1a41258f2e601b106b9c83baf18,2024-08-07T19:09:46.290000 +CVE-2024-7143,0,0,444409226f2889debaa1b6cea63b846cc438f1a41258f2e601b106b9c83baf18,2024-08-07T19:09:46.290000 CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000 CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000 CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000 @@ -259125,12 +259225,12 @@ CVE-2024-7160,0,0,39a8904dc42c635e004cd5b1ab82a58f9270ee9d90f27eafd7b2f7a3d898d3 CVE-2024-7161,0,0,3a84ea99e48e8a8d8048664ee759fce102c4899e7bf3a25b129131d6e118a2d3,2024-07-29T14:12:08.783000 CVE-2024-7162,0,0,89a4bb0daa62a108ba37ba1cd76131a6b4592ff5908e4382e3ba0ccae44d808b,2024-07-29T14:12:08.783000 CVE-2024-7163,0,0,81c756b3132cc48183d1a3c3acfd78fbea5503464491879bb3d1859dc5f53baf,2024-07-29T14:12:08.783000 -CVE-2024-7164,0,1,0bf2afce08279f0343a4bd67f7765b51e7eff2010a666e4d58bbda356aec3e42,2024-07-29T14:12:08.783000 -CVE-2024-7165,0,1,50c38ff0968945cd65797661830f546cac8ce65c0389700fd1c8d2a89d33667b,2024-07-29T14:12:08.783000 -CVE-2024-7166,0,1,0a1a62bfedf7462d5d9574180ab2e8b3b27b46b7641763121eedc39637d486e2,2024-07-29T14:12:08.783000 -CVE-2024-7167,0,1,bd6d62f4029527ee7ecd964615443e0e4402549ed446a96264315f14ed282110,2024-07-29T14:12:08.783000 -CVE-2024-7168,0,1,0e4f22468ac63c831318be415887160cf9c88c0ee7cde58b31455066b19516a2,2024-07-29T14:12:08.783000 -CVE-2024-7169,0,1,154eaf544c8efb37eb65dcf410d239bc49c6328d13b72e4d63941c04f69292a2,2024-07-29T14:12:08.783000 +CVE-2024-7164,0,0,0bf2afce08279f0343a4bd67f7765b51e7eff2010a666e4d58bbda356aec3e42,2024-07-29T14:12:08.783000 +CVE-2024-7165,0,0,50c38ff0968945cd65797661830f546cac8ce65c0389700fd1c8d2a89d33667b,2024-07-29T14:12:08.783000 +CVE-2024-7166,0,0,0a1a62bfedf7462d5d9574180ab2e8b3b27b46b7641763121eedc39637d486e2,2024-07-29T14:12:08.783000 +CVE-2024-7167,0,0,bd6d62f4029527ee7ecd964615443e0e4402549ed446a96264315f14ed282110,2024-07-29T14:12:08.783000 +CVE-2024-7168,0,0,0e4f22468ac63c831318be415887160cf9c88c0ee7cde58b31455066b19516a2,2024-07-29T14:12:08.783000 +CVE-2024-7169,0,0,154eaf544c8efb37eb65dcf410d239bc49c6328d13b72e4d63941c04f69292a2,2024-07-29T14:12:08.783000 CVE-2024-7170,0,0,603f43696ee0ec9295da3bc03045332c3d9e7acd2fe26079660e5663d42c5dd9,2024-08-08T12:46:18.550000 CVE-2024-7171,0,0,036dca614a1e9364d4eaff90070fc761bebdde7d325345f14ced7c694364a4d1,2024-08-08T12:39:09.323000 CVE-2024-7172,0,0,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000 @@ -259155,20 +259255,20 @@ CVE-2024-7190,0,0,2b3153272ef04df16e3b3b82082543891fd5ef4c119d2c927810c48999ba5c CVE-2024-7191,0,0,3de5f98b75f962a7bf81367cbbf7b9a6b561be4de787108b05ec954ed9012a18,2024-07-29T14:12:08.783000 CVE-2024-7192,0,0,8c1866f67c09e02aac206ab64e201e7bc7f8c1e59231c06a52249d22cc047da6,2024-07-29T14:12:08.783000 CVE-2024-7193,0,0,471f89b1f9e21dd135e74be96458737d2a22d1977909084981ac0db538f96c8f,2024-07-29T14:12:08.783000 -CVE-2024-7194,0,1,7050538cbf88dad5af2a94e46e90b30cb1807f51add40b990e742ba9dbe0b32f,2024-07-29T14:12:08.783000 -CVE-2024-7195,0,1,337415ebdf92ebfeed9bcb18c558d217a77733cdf9f97d278e7f95a6c3d9cfd0,2024-07-29T14:12:08.783000 -CVE-2024-7196,0,1,a1b6ef4bf4b05b1a16e0f10b8bf429378236b10c01abd2a91ec1c5f96671784c,2024-07-29T14:12:08.783000 -CVE-2024-7197,0,1,12c5bacb49896e2f4e8ed115dcbe1684b2da4e04506a3ed1a44526fe4f1076df,2024-07-29T14:12:08.783000 -CVE-2024-7198,0,1,040b62e2f1fbb0706e487ac2bda83f4bee595b7a76c43297db3da976dae843e0,2024-07-29T14:12:08.783000 -CVE-2024-7199,0,1,15ef370c496b9b0be6e672f4d9fb9487aadc7ab848d285c34c4f215b31b9ada6,2024-07-29T14:12:08.783000 -CVE-2024-7200,0,1,178eab947a5221a3cbb17d996968471d64a1f7959ac0efd3c81bb24b978ea518,2024-07-29T14:12:08.783000 +CVE-2024-7194,0,0,7050538cbf88dad5af2a94e46e90b30cb1807f51add40b990e742ba9dbe0b32f,2024-07-29T14:12:08.783000 +CVE-2024-7195,0,0,337415ebdf92ebfeed9bcb18c558d217a77733cdf9f97d278e7f95a6c3d9cfd0,2024-07-29T14:12:08.783000 +CVE-2024-7196,0,0,a1b6ef4bf4b05b1a16e0f10b8bf429378236b10c01abd2a91ec1c5f96671784c,2024-07-29T14:12:08.783000 +CVE-2024-7197,0,0,12c5bacb49896e2f4e8ed115dcbe1684b2da4e04506a3ed1a44526fe4f1076df,2024-07-29T14:12:08.783000 +CVE-2024-7198,0,0,040b62e2f1fbb0706e487ac2bda83f4bee595b7a76c43297db3da976dae843e0,2024-07-29T14:12:08.783000 +CVE-2024-7199,0,0,15ef370c496b9b0be6e672f4d9fb9487aadc7ab848d285c34c4f215b31b9ada6,2024-07-29T14:12:08.783000 +CVE-2024-7200,0,0,178eab947a5221a3cbb17d996968471d64a1f7959ac0efd3c81bb24b978ea518,2024-07-29T14:12:08.783000 CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000 CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000 CVE-2024-7204,0,0,1772f71824e8e67d08dd960b8980267be3eb60b7db474bb1b3294ba0efdcc4fb,2024-08-02T12:59:43.990000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 -CVE-2024-7211,0,1,89f8b654e75d4059a81a57cac28564b59a4efa0b696dcf7452239647f93f16ac,2024-08-02T13:16:06.853000 +CVE-2024-7211,0,0,89f8b654e75d4059a81a57cac28564b59a4efa0b696dcf7452239647f93f16ac,2024-08-02T13:16:06.853000 CVE-2024-7212,0,0,d8e81c1df21541a2a61b1ee61c0b13c7c5575d5a7c0cad80faa94c0502ea9af9,2024-08-06T14:06:56.937000 CVE-2024-7213,0,0,91cf0399575fcf8bfe7dc21faeb9bce09b9c6ac55860924943cc84f28093279f,2024-08-06T14:07:30.757000 CVE-2024-7214,0,0,3a78281a383bf44c352cba681f12759123f996c9d59985652a6e46e161f7ed5e,2024-08-06T14:08:05.393000 @@ -259184,7 +259284,7 @@ CVE-2024-7223,0,0,fb4ad2671317976e5224b8b90488cd911f8b35bdfcac7bcf593fd9864e14b3 CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e85,2024-07-30T13:32:45.943000 CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000 CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000 -CVE-2024-7246,0,1,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000 +CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000 CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000 CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000 CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000 @@ -259194,12 +259294,13 @@ CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 CVE-2024-7264,0,0,4c56e36858354627d468029972bf040b2893210da9a48750dcecdce8ded0e49b,2024-07-31T12:57:02.300000 -CVE-2024-7265,0,1,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000 -CVE-2024-7266,0,1,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000 -CVE-2024-7267,0,1,e8d85bd26709e9a7a3dc4e8006f3b5201faefcb4aaf4ea4c1f6b8820dbe896ef,2024-08-07T15:17:46.717000 -CVE-2024-7273,0,1,c54f0201f662353be4c71178ecb2b70feeb3be7ae1969d571fa06d849250755c,2024-07-31T12:57:02.300000 -CVE-2024-7274,0,1,220f148f22e0cdfff330f0ce278ee81a3638cc1ec9363d1b8e0bf68b06a6b216,2024-07-31T12:57:02.300000 -CVE-2024-7275,0,1,74aabb34c99755fa1fb9c0f4de607d1cfcf582865a86e88bc2523c63afbfed31,2024-07-31T12:57:02.300000 +CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000 +CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000 +CVE-2024-7267,0,0,e8d85bd26709e9a7a3dc4e8006f3b5201faefcb4aaf4ea4c1f6b8820dbe896ef,2024-08-07T15:17:46.717000 +CVE-2024-7272,1,1,0f67148a9aeb9690a6127129eb8401c0ea94a7712c477502b006aff587074ccf,2024-08-12T13:41:36.517000 +CVE-2024-7273,0,0,c54f0201f662353be4c71178ecb2b70feeb3be7ae1969d571fa06d849250755c,2024-07-31T12:57:02.300000 +CVE-2024-7274,0,0,220f148f22e0cdfff330f0ce278ee81a3638cc1ec9363d1b8e0bf68b06a6b216,2024-07-31T12:57:02.300000 +CVE-2024-7275,0,0,74aabb34c99755fa1fb9c0f4de607d1cfcf582865a86e88bc2523c63afbfed31,2024-07-31T12:57:02.300000 CVE-2024-7276,0,0,a277960bca5d831a928fa683ca27cd5e0f80dfef07b8475eaf01f736e513b6db,2024-08-08T20:25:32.643000 CVE-2024-7277,0,0,d07c1eb268c7c274994ec109c99051eb3a213fccffe945d0053bb23d3584d464,2024-08-08T20:07:38.717000 CVE-2024-7278,0,0,5267f7cc9b490f8ce43fbd3c5c727548e8d87d921907a5839886258517fd2c0e,2024-08-08T20:07:50.303000 @@ -259209,10 +259310,10 @@ CVE-2024-7281,0,0,878e786a4e433c6961a4936be4f0b9e2a9c535f1f3ea5308fabfdd12b56770 CVE-2024-7282,0,0,c8e44d7a08364e2e7fcb0a9314f8f52cc9787c21b4a2c9997ab91df79d9d7cf6,2024-08-08T13:54:32.003000 CVE-2024-7283,0,0,0840157a9698278fccd84198279898afd79cbfedc16de1455ebae08e4d0168cf,2024-08-08T13:52:03.277000 CVE-2024-7284,0,0,9bb087c7df17035abb573b3e7d617459334ebe99db4ac37ee1531c6a63296161,2024-08-08T13:49:32.727000 -CVE-2024-7285,0,1,b9a706cee1f754586ce816acb6104d22d216088b23caabfb777d3037dcee6bb3,2024-07-31T12:57:02.300000 -CVE-2024-7286,0,1,2f7599d0ec0182d5f408068092574ed775cbf4160ab4bbc4955d7974e2582b3e,2024-07-31T12:57:02.300000 -CVE-2024-7287,0,1,158d480f0c12b03d6c65f9988e7738c2456d4dfad2d7665ec693361930cae6a0,2024-07-31T12:57:02.300000 -CVE-2024-7288,0,1,5e7e37ba2e97b5c1e015c06c2de5cdee3086c24ae64e70a52f1b1895c8daf47c,2024-07-31T12:57:02.300000 +CVE-2024-7285,0,0,b9a706cee1f754586ce816acb6104d22d216088b23caabfb777d3037dcee6bb3,2024-07-31T12:57:02.300000 +CVE-2024-7286,0,0,2f7599d0ec0182d5f408068092574ed775cbf4160ab4bbc4955d7974e2582b3e,2024-07-31T12:57:02.300000 +CVE-2024-7287,0,0,158d480f0c12b03d6c65f9988e7738c2456d4dfad2d7665ec693361930cae6a0,2024-07-31T12:57:02.300000 +CVE-2024-7288,0,0,5e7e37ba2e97b5c1e015c06c2de5cdee3086c24ae64e70a52f1b1895c8daf47c,2024-07-31T12:57:02.300000 CVE-2024-7289,0,0,a709df24f87a0f503a11766c66b03ca94607de4e52c2ab315e56364f32619286,2024-07-31T12:57:02.300000 CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2bdb,2024-07-31T12:57:02.300000 CVE-2024-7291,0,0,298cd3a818c66e9bf797d2d090f42649293656283b8daab213f19385b28931e8,2024-08-05T12:41:45.957000 @@ -259220,18 +259321,18 @@ CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7c CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000 CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799ae9,2024-07-31T14:15:08.080000 CVE-2024-7302,0,0,3e3978a555cf8f7617492d06d41673a59c5323c552cb9b37b079247ec7c0af88,2024-08-01T12:42:36.933000 -CVE-2024-7303,0,1,78e3ce31646767c45a8241e78a4fc12e257bc9013d5378e81344b17bbbd2fe87,2024-07-31T12:57:02.300000 -CVE-2024-7306,0,1,60019ff9739b00eaae402e30c3ebf2ffc6f3db8be3483523faa750ece0215f21,2024-07-31T12:57:02.300000 -CVE-2024-7307,0,1,8476095e81ec710e7e9c3722c19632483eaa5873e650b0691bf646c8feee1673,2024-07-31T12:57:02.300000 -CVE-2024-7308,0,1,7e62114ea2d3b6c1a5a8ade9366399ea87a812a2d0e1a6a097a837e22fa3ec32,2024-07-31T12:57:02.300000 -CVE-2024-7309,0,1,5ccfece9a195af2bcab33eeb76ed6d8e998f45daf1218b4a428e39ed3952e4a4,2024-07-31T12:57:02.300000 -CVE-2024-7310,0,1,c85c13e977bb78ddae23c7df7677c3a96f9884de3a7996e4498df3ced955ce83,2024-07-31T12:57:02.300000 -CVE-2024-7311,0,1,049be7cb97674b9bc8fe5857eef44c6cbc0ed5d4b959c108694f8fb2cd9e1f95,2024-07-31T12:57:02.300000 -CVE-2024-7314,0,1,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000 -CVE-2024-7317,0,1,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 -CVE-2024-7319,0,1,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000 -CVE-2024-7320,0,1,73b40c9d1ba09e0a60f1026c833c1952afbb2448117bb6f65866e430bfddd39a,2024-07-31T12:57:02.300000 -CVE-2024-7321,0,1,1e726dacbb5a7f131f9638d1c02615c92b858d01313b3cd29eaebd7e81c2cbfa,2024-07-31T12:57:02.300000 +CVE-2024-7303,0,0,78e3ce31646767c45a8241e78a4fc12e257bc9013d5378e81344b17bbbd2fe87,2024-07-31T12:57:02.300000 +CVE-2024-7306,0,0,60019ff9739b00eaae402e30c3ebf2ffc6f3db8be3483523faa750ece0215f21,2024-07-31T12:57:02.300000 +CVE-2024-7307,0,0,8476095e81ec710e7e9c3722c19632483eaa5873e650b0691bf646c8feee1673,2024-07-31T12:57:02.300000 +CVE-2024-7308,0,0,7e62114ea2d3b6c1a5a8ade9366399ea87a812a2d0e1a6a097a837e22fa3ec32,2024-07-31T12:57:02.300000 +CVE-2024-7309,0,0,5ccfece9a195af2bcab33eeb76ed6d8e998f45daf1218b4a428e39ed3952e4a4,2024-07-31T12:57:02.300000 +CVE-2024-7310,0,0,c85c13e977bb78ddae23c7df7677c3a96f9884de3a7996e4498df3ced955ce83,2024-07-31T12:57:02.300000 +CVE-2024-7311,0,0,049be7cb97674b9bc8fe5857eef44c6cbc0ed5d4b959c108694f8fb2cd9e1f95,2024-07-31T12:57:02.300000 +CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000 +CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 +CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000 +CVE-2024-7320,0,0,73b40c9d1ba09e0a60f1026c833c1952afbb2448117bb6f65866e430bfddd39a,2024-07-31T12:57:02.300000 +CVE-2024-7321,0,0,1e726dacbb5a7f131f9638d1c02615c92b858d01313b3cd29eaebd7e81c2cbfa,2024-07-31T12:57:02.300000 CVE-2024-7323,0,0,9ade4a736dcd7d946c31626909fde6ca44169336c2686d18f85ae47322aa8137,2024-08-02T12:59:43.990000 CVE-2024-7324,0,0,095fe191ca170a7ec3aafa46faf9007b467b7e450c1bcd7d0af0a45c400bd246,2024-08-01T12:42:36.933000 CVE-2024-7325,0,0,a6bde1ed410a10749d44bba07a55a46b87addce8acb914516046e9ef7fd987c8,2024-08-01T12:42:36.933000 @@ -259252,10 +259353,10 @@ CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000 CVE-2024-7343,0,0,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000 -CVE-2024-7348,0,1,d7b00dbf70f82f245132543edc233e6f06b77f890990680f1abded6327fcd83b,2024-08-08T18:55:28.493000 +CVE-2024-7348,0,0,d7b00dbf70f82f245132543edc233e6f06b77f890990680f1abded6327fcd83b,2024-08-08T18:55:28.493000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 -CVE-2024-7353,0,1,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000 -CVE-2024-7355,0,1,071610fbf603e9022aa74d299a7d28ffd46303d85d85cb60c4b41df2eba6145e,2024-08-07T15:17:46.717000 +CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000 +CVE-2024-7355,0,0,071610fbf603e9022aa74d299a7d28ffd46303d85d85cb60c4b41df2eba6145e,2024-08-07T15:17:46.717000 CVE-2024-7356,0,0,422e8f0e5351e2aaa94610787f75fca2971bce2e8243e94e1dab25149b00bf15,2024-08-05T12:41:45.957000 CVE-2024-7357,0,0,676709a5ed7eee4761639da6bebba6e85a1f66e54db8a0d1e3440582cc707fb4,2024-08-07T14:15:33.230000 CVE-2024-7358,0,0,d0d3bbadf8d959881fb1ac3e2ef5c9a3fa1992957990fec2aa7880f237382301,2024-08-01T16:45:25.400000 @@ -259279,80 +259380,90 @@ CVE-2024-7375,0,0,28bb47d4b9853eaa90b578de46ee4931868a9172df342b2f5aaa2627a30888 CVE-2024-7376,0,0,6a8239d148373b81ff417f2f5b853294092602786d672e55874e9d15579ca5e1,2024-08-09T11:22:53.947000 CVE-2024-7377,0,0,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f27,2024-08-09T11:22:18.483000 CVE-2024-7378,0,0,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000 +CVE-2024-7382,1,1,01c5212f4fa00121002fa8baa527f3a77d1bda25dc068526094d170157a300b3,2024-08-12T13:41:36.517000 CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 -CVE-2024-7394,0,1,29459446676ebb07a97678c0a588cd4da58f4cf687ed192aec71d6f9cff45400,2024-08-08T18:55:19.180000 +CVE-2024-7394,0,0,29459446676ebb07a97678c0a588cd4da58f4cf687ed192aec71d6f9cff45400,2024-08-08T18:55:19.180000 CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000 CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000 +CVE-2024-7399,1,1,d30b708a498ec985717002912d6f2ea5c7e57732418cf84055f23239b601747d,2024-08-12T13:41:36.517000 +CVE-2024-7408,1,1,728d92cb3e4bd7993413f2cb9d202dd3d05ca4e90a7d6c8b19000edc1b4dbe7d,2024-08-12T13:41:36.517000 CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000 -CVE-2024-7436,0,1,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000 -CVE-2024-7437,0,1,99178b23e8eaf2fbd1c298136ca7df8238a370bf667ac2ff7e1932d72e24ba2b,2024-08-05T12:41:45.957000 -CVE-2024-7438,0,1,9d2b470955bb57567cb661518ea084575b4f3d18667b41330e56f0da78ca0da8,2024-08-05T12:41:45.957000 +CVE-2024-7410,1,1,247c090cb12333e31f3a0efea00d18747dfe5a3d5c256e6005fe0d4e1c4d1667,2024-08-12T13:41:36.517000 +CVE-2024-7412,1,1,b2cec2bd274b261ef09607f2e770ed1c42b7cfc2487929d65308251b8ca5fb1a,2024-08-12T13:41:36.517000 +CVE-2024-7413,1,1,1e2e6e629ae076e767a4ed710c2f32c76d2bd71396701e30749c7812afe7edb9,2024-08-12T13:41:36.517000 +CVE-2024-7414,1,1,75779b8687375e2d55d3e2d954892bdff56935440cca361ae4c6a6a0a4f3bed5,2024-08-12T13:41:36.517000 +CVE-2024-7416,1,1,9f5565f11e96fff207b91fc0825d45934365835075928991c71489e2cad44813,2024-08-12T13:41:36.517000 +CVE-2024-7436,0,0,4e5f8b4434de8d3be7545b252fde74866f6d1e15f143f31c26845d516524cae6,2024-08-05T12:41:45.957000 +CVE-2024-7437,0,1,6536d7f97d7ad58b67ec8c23497b1bab63383020d43415bc5b4c83af23e0fa6d,2024-08-12T13:38:43.060000 +CVE-2024-7438,0,1,e0751aac5a1208089fd3136e155c05769dcef78130a2d9c6fdc04c87ca92fb9a,2024-08-12T13:38:43.203000 CVE-2024-7439,0,0,204654bc435912bb662e77ea5999fe9bd86ea6af51c6399ec290489bece3b379,2024-08-06T17:46:40.733000 CVE-2024-7440,0,0,62656be9755f0ada2d43a55a5e3a040620a40ed7bbe8af33fb3aed726522eeca,2024-08-07T21:15:41.940000 CVE-2024-7441,0,0,4a0da838a1c1d69cab93448630a4051d1882c4be56020df53067927eac550ee1,2024-08-07T17:15:52.607000 CVE-2024-7442,0,0,272c8e76d88f6f0a2e21eba30e1db85a28ca7838620513e3d3bbb8b30bf58ad9,2024-08-06T17:45:39.703000 CVE-2024-7443,0,0,6fd967d6e919ba4fd37dfeb9ebba86f65e44a71c337f483ada629ef65359269a,2024-08-06T17:47:12.660000 -CVE-2024-7444,0,1,6a27b17daa0421379f220a8738343b4eaf4bebafc4cc4a7d1e341c703fe0b8b7,2024-08-05T12:41:45.957000 +CVE-2024-7444,0,0,6a27b17daa0421379f220a8738343b4eaf4bebafc4cc4a7d1e341c703fe0b8b7,2024-08-05T12:41:45.957000 CVE-2024-7445,0,0,cfdc75d4fec77cd886589c658aa3dd464f31452c81f68546e40e8c22e50a8eed,2024-08-09T15:36:06.757000 CVE-2024-7446,0,0,e26be21c8dbcfe67dfe123a70d3d827309d2b8d2fde731242ee6ec383c477df8,2024-08-09T15:36:35.453000 -CVE-2024-7449,0,1,297f4c3dac3fe7682a436b0d9b63f8bd563160fe5bbdc7914db4fa732bf7b03e,2024-08-05T12:41:45.957000 +CVE-2024-7449,0,0,297f4c3dac3fe7682a436b0d9b63f8bd563160fe5bbdc7914db4fa732bf7b03e,2024-08-05T12:41:45.957000 CVE-2024-7450,0,0,f36a88ecb7cf7b37b6090837acfb29fe52cc382469b7cf045e11a727c85c93f7,2024-08-09T15:33:58.153000 CVE-2024-7451,0,0,6c3c74a805aba0686ff087a4aeedf52269a2704aceeaba8fd15f2602a7b0b5b8,2024-08-09T15:33:56.027000 CVE-2024-7452,0,0,9b0d7a5910a43cd09bce0b4f25c71bf821fcb49ab8aff5df5dd61e0e89344b20,2024-08-09T15:33:53.797000 -CVE-2024-7453,0,1,0029f271a1f309f630c23134b7acc83430f1dcf711ae28db68ad9f435986d9bb,2024-08-05T12:41:45.957000 -CVE-2024-7454,0,1,8e5a8fd42e45f3016f27594d775a7938d8490e35323cf0f97bd8d1a42cbd210f,2024-08-05T12:41:45.957000 -CVE-2024-7455,0,1,046881407edba5d5518c2b947bd1e836539fd80ab5ae5a2c4772eb47da44c350,2024-08-05T12:41:45.957000 +CVE-2024-7453,0,0,0029f271a1f309f630c23134b7acc83430f1dcf711ae28db68ad9f435986d9bb,2024-08-05T12:41:45.957000 +CVE-2024-7454,0,0,8e5a8fd42e45f3016f27594d775a7938d8490e35323cf0f97bd8d1a42cbd210f,2024-08-05T12:41:45.957000 +CVE-2024-7455,0,0,046881407edba5d5518c2b947bd1e836539fd80ab5ae5a2c4772eb47da44c350,2024-08-05T12:41:45.957000 CVE-2024-7458,0,0,2c9d4dd630ee9d646df3107c9eafd0e6cad217e61388b41410f8713d27f85974,2024-08-06T17:12:28.250000 CVE-2024-7459,0,0,53c79cef732ccbff6adb36bb342854abc83915346c054d98b70903c7c6347372,2024-08-06T17:14:16.667000 CVE-2024-7460,0,0,d48d1421ea3ce9fda403f952725d01106181045f180d1b45462656996088205d,2024-08-06T17:19:25.597000 -CVE-2024-7461,0,1,189ae990a8c2eef74fc9b600d565c2ec70cc463fa8cf230cacb55e0adada7e7a,2024-08-05T12:41:45.957000 -CVE-2024-7462,0,1,0c912d667469622af5c2c0c24d30bea781a2282cf0c84c5636748830eadc0a43,2024-08-05T12:41:45.957000 -CVE-2024-7463,0,1,86299ef96adc6a6757cbbca17deb48a0f25a561043fc6716221c329cbd11605c,2024-08-05T12:41:45.957000 -CVE-2024-7464,0,1,0915cfe88c3e370d33c628bbcee7fb1beead65ff329b0413cdbeda93e3726855,2024-08-05T12:41:45.957000 -CVE-2024-7465,0,1,4684e29438bbef1b4068f850f384a71674cf719420e7afecdc7e1d3558907402,2024-08-05T12:41:45.957000 +CVE-2024-7461,0,0,189ae990a8c2eef74fc9b600d565c2ec70cc463fa8cf230cacb55e0adada7e7a,2024-08-05T12:41:45.957000 +CVE-2024-7462,0,0,0c912d667469622af5c2c0c24d30bea781a2282cf0c84c5636748830eadc0a43,2024-08-05T12:41:45.957000 +CVE-2024-7463,0,0,86299ef96adc6a6757cbbca17deb48a0f25a561043fc6716221c329cbd11605c,2024-08-05T12:41:45.957000 +CVE-2024-7464,0,0,0915cfe88c3e370d33c628bbcee7fb1beead65ff329b0413cdbeda93e3726855,2024-08-05T12:41:45.957000 +CVE-2024-7465,0,0,4684e29438bbef1b4068f850f384a71674cf719420e7afecdc7e1d3558907402,2024-08-05T12:41:45.957000 CVE-2024-7466,0,0,4a7493679a7686875f96443bb29dcb52f0aca6db65eafd0ddf5cfb55fbb78713,2024-08-06T17:27:55.297000 CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b5639,2024-08-06T17:31:58.323000 CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000 CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000 CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000 -CVE-2024-7477,0,1,a7310ed0a42553afc84344687550c6829e3d47b126a5957463b9eb73b61d1401,2024-08-08T18:55:28.493000 -CVE-2024-7480,0,1,38f4d8fe47f2c178049fd94e502ba92cdefb806bca08621d7d17866ecd58c36f,2024-08-08T18:55:19.180000 +CVE-2024-7477,0,0,a7310ed0a42553afc84344687550c6829e3d47b126a5957463b9eb73b61d1401,2024-08-08T18:55:28.493000 +CVE-2024-7480,0,0,38f4d8fe47f2c178049fd94e502ba92cdefb806bca08621d7d17866ecd58c36f,2024-08-08T18:55:19.180000 CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000 CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 -CVE-2024-7490,0,1,0d9f55f6f55f8eae5e35ab52af521bf402f9e302900974a55f8e1e27f157c1e9,2024-08-08T18:55:28.493000 +CVE-2024-7490,0,0,0d9f55f6f55f8eae5e35ab52af521bf402f9e302900974a55f8e1e27f157c1e9,2024-08-08T18:55:28.493000 CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000 CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000 CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000 -CVE-2024-7496,0,1,772596f95dececa3f2bcfa8a76b1b55b615ac0f07b1335e797a644cdb9213de0,2024-08-06T16:30:24.547000 -CVE-2024-7497,0,1,171d6206f3c6dadbebd8902a7e0a0a1774e2796713d12e03c39eb365b5f7df1a,2024-08-06T16:30:24.547000 -CVE-2024-7498,0,1,34558512fcd1426a2a2d148e9d2625ea3cd75c20501206f3df3d025acddc8114,2024-08-06T16:30:24.547000 -CVE-2024-7499,0,1,6a02f27fcba04de10769d0a3eb8df3330f0153ea641827dd4e7a8cea71e560a6,2024-08-06T16:30:24.547000 +CVE-2024-7496,0,0,772596f95dececa3f2bcfa8a76b1b55b615ac0f07b1335e797a644cdb9213de0,2024-08-06T16:30:24.547000 +CVE-2024-7497,0,0,171d6206f3c6dadbebd8902a7e0a0a1774e2796713d12e03c39eb365b5f7df1a,2024-08-06T16:30:24.547000 +CVE-2024-7498,0,0,34558512fcd1426a2a2d148e9d2625ea3cd75c20501206f3df3d025acddc8114,2024-08-06T16:30:24.547000 +CVE-2024-7499,0,0,6a02f27fcba04de10769d0a3eb8df3330f0153ea641827dd4e7a8cea71e560a6,2024-08-06T16:30:24.547000 CVE-2024-7500,0,0,931897362fb2ba79107882fb00e70aa09beff68614f848f39093ae56ae63e032,2024-08-06T16:30:24.547000 CVE-2024-7502,0,0,593e6a5ba31f1fdbc1218e78f5a0189c29f786fbc1497727b1d83f39b553f400,2024-08-07T15:17:46.717000 +CVE-2024-7503,1,1,e784b3ab46a1e81c39e310fabae0c1eb2177c76661481ff0b29d2e5ba473397f,2024-08-12T13:41:36.517000 CVE-2024-7505,0,0,aecd8f77bf4729577cedcf26eddaf42651063906380e7519311f6a7e624532e3,2024-08-06T16:30:24.547000 CVE-2024-7506,0,0,83bf779e76b2f1cdbd01b68e2c6cb45ed4862a6d64f57c3f27fd8241cef70031,2024-08-06T16:30:24.547000 -CVE-2024-7518,0,1,0273ca4eeb92697ec5dfc38e32e28b00efa9adf5d48621c9ed57564620a11777,2024-08-06T23:15:59.653000 +CVE-2024-7512,1,1,b63cf02b54f6a1c55700caf6b213a1220f80db8363689f29712535d27562382e,2024-08-12T13:41:36.517000 +CVE-2024-7518,0,0,0273ca4eeb92697ec5dfc38e32e28b00efa9adf5d48621c9ed57564620a11777,2024-08-06T23:15:59.653000 CVE-2024-7519,0,0,24768d8764f4f28adc1fbfcbb529254838657a3f1d1db417909b6d021fab1d2f,2024-08-07T21:35:12.903000 -CVE-2024-7520,0,1,c39a453af18b8f3349b932967513e3bf611403aa8aefa55470ba5a0621413536,2024-08-06T23:15:59.803000 -CVE-2024-7521,0,1,5de22b7ade2b156daf606f0d794aa7a05ad9bade7652d1fa8811de142c7bf731,2024-08-06T23:15:59.877000 +CVE-2024-7520,0,0,c39a453af18b8f3349b932967513e3bf611403aa8aefa55470ba5a0621413536,2024-08-06T23:15:59.803000 +CVE-2024-7521,0,0,5de22b7ade2b156daf606f0d794aa7a05ad9bade7652d1fa8811de142c7bf731,2024-08-06T23:15:59.877000 CVE-2024-7522,0,0,84fe71da8cf075dcd103677abb54562bdd9f546fb1c9071f317f44135906c9bd,2024-08-08T16:35:14.220000 -CVE-2024-7523,0,1,fe83ea86a9ef382979bc6637fb391f4f5b138f7fa6edf8afc732d9a7d7226616,2024-08-06T16:30:24.547000 -CVE-2024-7524,0,1,922fd32401db78399003a2728d5a83f1486debb49b4159a7c46f4d064f93af28,2024-08-06T16:30:24.547000 -CVE-2024-7525,0,1,f326aef973c25c51b95813cca4973aadaff003e934a195dd1c0b8c03991ac521,2024-08-06T23:16:00.030000 +CVE-2024-7523,0,0,fe83ea86a9ef382979bc6637fb391f4f5b138f7fa6edf8afc732d9a7d7226616,2024-08-06T16:30:24.547000 +CVE-2024-7524,0,0,922fd32401db78399003a2728d5a83f1486debb49b4159a7c46f4d064f93af28,2024-08-06T16:30:24.547000 +CVE-2024-7525,0,0,f326aef973c25c51b95813cca4973aadaff003e934a195dd1c0b8c03991ac521,2024-08-06T23:16:00.030000 CVE-2024-7526,0,0,b7dc1769424faeb68068ce309d6d3523a91a1d4fb4a85465f17d0f1c4d8fc8b5,2024-08-07T21:35:13.907000 -CVE-2024-7527,0,1,eb1ef90da60cf895d3c3dfb3181b55d7af40ec00ea5f600e9312a555d9dfe5b0,2024-08-06T23:16:00.177000 +CVE-2024-7527,0,0,eb1ef90da60cf895d3c3dfb3181b55d7af40ec00ea5f600e9312a555d9dfe5b0,2024-08-06T23:16:00.177000 CVE-2024-7528,0,0,be8e71fd0f17d389323324dc26a8ec8e7767e0b66d4026ffc4caff629d8c56c3,2024-08-09T15:35:06.313000 -CVE-2024-7529,0,1,3c95a9d975c00668a8163c5076becea57f7f5ba4370cae91c3a40b64aeafeba2,2024-08-06T23:16:00.317000 +CVE-2024-7529,0,0,3c95a9d975c00668a8163c5076becea57f7f5ba4370cae91c3a40b64aeafeba2,2024-08-06T23:16:00.317000 CVE-2024-7530,0,0,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000 -CVE-2024-7531,0,1,80cf96ec2bff628ebc77d7b3cd9cf7e243c6128d81982ce30e4ea6acfbbb0f07,2024-08-06T16:30:24.547000 -CVE-2024-7532,0,1,5846059bc613ea652f10b35dc03c383075d8ed97e5c092c8cb873152c52a228a,2024-08-07T16:35:22.457000 -CVE-2024-7533,0,1,fb1bc2b44a55980a5d971fb77c69c411b832546d5e03293872f17902c7d49326,2024-08-07T20:35:27.510000 -CVE-2024-7534,0,1,147190480b7e876b3bad90bb236887c8308b0c39899a28f685cda11018289cb3,2024-08-07T15:17:46.717000 -CVE-2024-7535,0,1,7f8d08fac0e6924bc38581e0c586205f4060eeb568e34f4005d3f1e8f6ed7105,2024-08-08T20:35:12.890000 -CVE-2024-7536,0,1,66f66f76fb4fc95b5bdc01d446788a648d7d45d46b76436e3ed625d711701316,2024-08-07T15:17:46.717000 +CVE-2024-7531,0,0,80cf96ec2bff628ebc77d7b3cd9cf7e243c6128d81982ce30e4ea6acfbbb0f07,2024-08-06T16:30:24.547000 +CVE-2024-7532,0,0,5846059bc613ea652f10b35dc03c383075d8ed97e5c092c8cb873152c52a228a,2024-08-07T16:35:22.457000 +CVE-2024-7533,0,0,fb1bc2b44a55980a5d971fb77c69c411b832546d5e03293872f17902c7d49326,2024-08-07T20:35:27.510000 +CVE-2024-7534,0,0,147190480b7e876b3bad90bb236887c8308b0c39899a28f685cda11018289cb3,2024-08-07T15:17:46.717000 +CVE-2024-7535,0,0,7f8d08fac0e6924bc38581e0c586205f4060eeb568e34f4005d3f1e8f6ed7105,2024-08-08T20:35:12.890000 +CVE-2024-7536,0,0,66f66f76fb4fc95b5bdc01d446788a648d7d45d46b76436e3ed625d711701316,2024-08-07T15:17:46.717000 CVE-2024-7537,0,0,cac12a6937ce18481e876031006fbab26ca4b7876c502da0485cb83b4f4bb24d,2024-08-06T16:30:24.547000 CVE-2024-7538,0,0,54464c6cea77354c9f1160315b73ea1ed8ffcd06176d127a8c8becba6ed2b81d,2024-08-06T16:30:24.547000 CVE-2024-7539,0,0,8ca50ab02514fa4f50147af014ed5c28ffea833055fdfc32acd3499e2ad0c824,2024-08-06T16:30:24.547000 @@ -259365,20 +259476,68 @@ CVE-2024-7545,0,0,3f097ebbd611ad4138ec1a3955ea96d707ad40d33be8dbb703c606b41a0411 CVE-2024-7546,0,0,a0b520d000dce64c3863ed1b5eb696449d97e5ef3503a621e0cf62f26b7a1008,2024-08-06T16:30:24.547000 CVE-2024-7547,0,0,a7dc0beedfe6604b5fe50ab4a1b4247c2920dee27f624b3cc2ef87158404641f,2024-08-06T16:30:24.547000 CVE-2024-7548,0,0,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee770,2024-08-08T13:04:18.753000 -CVE-2024-7550,0,1,61bd402c5d8958eb304481a864c3e35a4296ad282c2ac49bec3fc0f3218917a8,2024-08-07T20:35:28.567000 -CVE-2024-7551,0,1,20bc7e504cf383ec6ce2765ca9ec0171200e70463abecce9f82ee08caee473df,2024-08-06T16:30:24.547000 +CVE-2024-7550,0,0,61bd402c5d8958eb304481a864c3e35a4296ad282c2ac49bec3fc0f3218917a8,2024-08-07T20:35:28.567000 +CVE-2024-7551,0,0,20bc7e504cf383ec6ce2765ca9ec0171200e70463abecce9f82ee08caee473df,2024-08-06T16:30:24.547000 CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000 -CVE-2024-7553,0,1,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000 +CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000 CVE-2024-7554,0,0,4a573fb2ab24355a17092729215e215195bfd8edf91c08645b945dde25aae201,2024-08-08T13:04:18.753000 +CVE-2024-7557,1,1,0c30e70b1e206af9f65679f553f4f4dd3e50bfbd941deb67d151931f9999782b,2024-08-12T13:41:36.517000 CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9cd1,2024-08-08T13:04:18.753000 CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000 -CVE-2024-7578,0,1,6775b71bfb147f33ac75e26864dff0d49501fe87846b04dfe823255ec77604d5,2024-08-07T15:17:46.717000 -CVE-2024-7579,0,1,889817c5384ba36003787d6aa90c4889164dbbf7f4fbfe5c6f0287e20d3cf6ed,2024-08-07T15:17:46.717000 -CVE-2024-7580,0,1,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000 -CVE-2024-7581,0,1,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000 +CVE-2024-7574,1,1,4cba2fbcd53a26b5f07236e3f6d8e2e24cb14d9ca03c37d251c45b6b1172a6a8,2024-08-12T13:41:36.517000 +CVE-2024-7578,0,0,6775b71bfb147f33ac75e26864dff0d49501fe87846b04dfe823255ec77604d5,2024-08-07T15:17:46.717000 +CVE-2024-7579,0,0,889817c5384ba36003787d6aa90c4889164dbbf7f4fbfe5c6f0287e20d3cf6ed,2024-08-07T15:17:46.717000 +CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000 +CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000 CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000 CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cda6,2024-08-08T20:54:35.117000 -CVE-2024-7584,0,1,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000 -CVE-2024-7585,0,1,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000 +CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000 +CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000 +CVE-2024-7589,1,1,2afd7787e0a0588f4645017d46935a6186bb88e5ac6ebddb54ad1e84436c29c1,2024-08-12T13:41:36.517000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 +CVE-2024-7613,1,1,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000 +CVE-2024-7614,1,1,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000 +CVE-2024-7615,1,1,6c5a3d2b322898b551bada40c532b08076a3798009e747124e833bfdffe0bb9a,2024-08-12T13:41:36.517000 +CVE-2024-7616,1,1,14d6249fbc202d91be9a0d467964f460009c28cde54ece458cca485cd4a0e15a,2024-08-12T13:41:36.517000 +CVE-2024-7621,1,1,1acf6d4c2a821fce1e3f9264509576725bd5b71a2c3ef943afe6ab5d29351820,2024-08-12T13:41:36.517000 +CVE-2024-7633,1,1,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 +CVE-2024-7635,1,1,330e4c31af06e1fa39a084a042067cc2714cfc9a1302a27b2cb8b725b37ba5f4,2024-08-12T13:41:36.517000 +CVE-2024-7636,1,1,c4f4b71cbb74b70101cbb74c711b9665ce07671c635fe9367b91f52e05f765d3,2024-08-12T13:41:36.517000 +CVE-2024-7637,1,1,fc4ccde00eb7528a421af9ca30b413e878803f96ed6fbe7d99a3f171bf64ff47,2024-08-12T13:41:36.517000 +CVE-2024-7638,1,1,9c7ff4d199ec6ce3f10b65adf232875b0d976e89c3eb2fa696d35e41c7101bfe,2024-08-12T13:41:36.517000 +CVE-2024-7639,1,1,9d6c75c884dc2e8e3ef472070df8fe7a914bafdd0798dc36470613e32c71d830,2024-08-12T13:41:36.517000 +CVE-2024-7640,1,1,02b2202fd51fe43737923ae64df1052f5039a662e71590aab90d06fa92d4bde1,2024-08-12T13:41:36.517000 +CVE-2024-7641,1,1,03fa25aa37341196cabd8b1daf86234f4e5804ab6ec7da94a6f750820c8ad603,2024-08-12T13:41:36.517000 +CVE-2024-7642,1,1,a80b68df076256e2382946107c1dcd30b5ca3af8cd860d940dc2ef7075b201d1,2024-08-12T13:41:36.517000 +CVE-2024-7643,1,1,747051de7ea3526843a76b422928f95e74211274906a89155eedbf6381e90db1,2024-08-12T13:41:36.517000 +CVE-2024-7644,1,1,69069343bf60194181229970ae23b0a247b1b3a66d13d02d18d86f11bba31d94,2024-08-12T13:41:36.517000 +CVE-2024-7645,1,1,b152ddbcd4425ac1d44a420ec07eeb17055fa188376b5255d5c3f2006ed77df0,2024-08-12T13:41:36.517000 +CVE-2024-7648,1,1,8d0848f3c912d45507f2515d657c3145304e9beedf27145e13d7372b35504285,2024-08-12T13:41:36.517000 +CVE-2024-7649,1,1,71a050c23b49b2bf89e78f71215149381b0d79d78392c26dd3fc2a8745df9a5b,2024-08-12T13:41:36.517000 +CVE-2024-7657,1,1,7357c1bc93f9a709f8b06e884fd3c0f42c2b2b2014ed65ebd233a5a1a23e8b32,2024-08-12T13:41:36.517000 +CVE-2024-7658,1,1,2c4e4e6d05bacb947404781f1cff946545a4eea0287d1ed536efb407107102b7,2024-08-12T13:41:36.517000 +CVE-2024-7659,1,1,040a09b3f31070d5196c99fc605162a62530ad9378007de9005e76d64fe2722b,2024-08-12T13:41:36.517000 +CVE-2024-7660,1,1,cc5ac4ee5919f40ef0846508b6964256de615eaf415ee50d9ba90e94f96f956b,2024-08-12T13:41:36.517000 +CVE-2024-7661,1,1,a2d7e427887a28613990288416ed7d3e55c875ae06f096c455e444486d94e830,2024-08-12T13:41:36.517000 +CVE-2024-7662,1,1,1465f157bd49d42b30fd1ad144cc4f84a28fabd1dae164c19943517c3d07ea39,2024-08-12T13:41:36.517000 +CVE-2024-7663,1,1,a7af1bcc23685fdb06a1c940f1e3968171a8ac751d6abde4d02cb06ff30d4409,2024-08-12T13:41:36.517000 +CVE-2024-7664,1,1,fe59fb219679d05707a283e2234def3313501c84316d5e8a31c7c874ba6f5977,2024-08-12T13:41:36.517000 +CVE-2024-7665,1,1,e4b23464cdfe06a161f128f6d5c0e5b142370a15921348610f565ffe8ad86333,2024-08-12T13:41:36.517000 +CVE-2024-7666,1,1,91bd4b935f117b3d179b04234ed804b3ada0d0c1db239bdb734fa7f40f1723bc,2024-08-12T13:41:36.517000 +CVE-2024-7667,1,1,5eb06bc20b6a88f576b6d9b5a73a97ecfa508b078e2bb6273d199f3548d37fc5,2024-08-12T13:41:36.517000 +CVE-2024-7668,1,1,b537a6c7714b5157195f351f61edd9d5acad78902b2017d15306c24fbabd85fc,2024-08-12T13:41:36.517000 +CVE-2024-7669,1,1,ee7dda9c6ecbef0db6ce7b5931190b96469ca0bcc2c7c99b3ee5024fbdee2d8b,2024-08-12T13:41:36.517000 +CVE-2024-7676,1,1,f6d73b49ba045b82b57859441ffd4f013a514171c8c2d21da973c5322cf5e4e0,2024-08-12T13:41:36.517000 +CVE-2024-7677,1,1,8c04efcb8821bb6d4e3d232454edc2f35551a52f49b297e253d1b8b458af4560,2024-08-12T13:41:36.517000 +CVE-2024-7678,1,1,687f8e75f1e026b30b21eed69883a8b3ef2994af3238d3545d54389861cd8449,2024-08-12T13:41:36.517000 +CVE-2024-7680,1,1,5c48bb2724f0b433022e56968140462a5692760df19cd37a3be1566e8339e09e,2024-08-12T13:41:36.517000 +CVE-2024-7681,1,1,befacda4a175ace19dbfeaa9ce987e4337f5ec14ad0900504f720e5489e0f014,2024-08-12T13:41:36.517000 +CVE-2024-7682,1,1,b0ef4206fed99845c91715793cfa1944cee8bc79ac21a700b8d0c3e1e3f2fba8,2024-08-12T13:41:36.517000 +CVE-2024-7683,1,1,184c8441aeee1399a10570eec1ae85db1a96dc4419787dd917127300fb23e226,2024-08-12T13:41:36.517000 +CVE-2024-7684,1,1,1cd1616fd5cdfcc64d8f4101825657bd014c3a04c15343f65e565e9e5dd16b1f,2024-08-12T13:41:36.517000 +CVE-2024-7685,1,1,02afd545542a50266d19d3efb9a8ba3b5320834a3ffad0cba2d2ebd3fb80a7d9,2024-08-12T13:41:36.517000 +CVE-2024-7686,1,1,f21a88187d0c2861c054358a83a714e439424ee7cd8208e0fde162e66a644c15,2024-08-12T13:41:36.517000 +CVE-2024-7693,1,1,21750a5e6660c45557c197a1268fead46b4ed04e41025b7b6ec8827e0452be00,2024-08-12T13:41:36.517000 +CVE-2024-7694,1,1,7eb01f663f1a6ae6fa8d343bc54dd9427e90e5a6b166e3bddc2347c03fdce95f,2024-08-12T13:41:36.517000 +CVE-2024-7697,1,1,faf28f1beea4b76b5b331adfd922738b089e5a62635300193d74bc0e23980976,2024-08-12T13:41:36.517000